ࡱ>    @ bjbjFF R ,,dn n n n!((()DDDFlK)~r&S s(tvv->~k&G,pqqqqqqq$uRfw#r(%Aφ^-%A%A#r@"@"vv8rMMM%A@"v(vq.M%AqMMB [\ &(jvS pDEOgjNr0~r5hrVxGVxj))"2"@"@"Vx(j$?>?,M!@$E@???#r#r))$L)) GENERIC SECURITY GUIDE FOR HUMANITARIAN ORGANISATIONS Commissioned by ECHO 2004 ECHO CONTACT FOR SECURITY MATTERS The ECHO contact for security matters is Mr Val Flynn, ECHO HQ XE "ECHO"  and Field Security Co-ordinator. Tel: +32 2 299 0983 Fax: +32 2 299 1172 E-mail:  HYPERLINK "mailto:Anthony-Val.Flynn@cec.eu.int" Anthony-Val.Flynn@cec.eu.int Web:  HYPERLINK "http://www.europa.eu.int/comm/echo/index_en.htm" www.europa.eu.int/comm/echo/index_en.htm DISCLAIMER This document is general in nature, and its contents may not be applicable in all situations. The advice it offers may be inappropriate in some circumstances and in some cases could even place people at risk of death or injury. Its contents should be modified and adapted as appropriate, to suit the needs of particular organisations and situations. It is not designed as a stand-alone document, but should be used by qualified and experienced managers who should exercise their judgement at all times as to the best course of action. This document has been produced with the financial assistance of the European Commissions Directorate-General for Humanitarian Aid - ECHO. The views expressed herein should not be taken, in any way, to reflect the official opinion of the European Commission. ECHO, The Evaluation Partnership and the author accept no liability whatsoever arising from the use of this document. TABLE OF CONTENTS  TOC \o "1-3" \h \z  HYPERLINK \l "_Toc88728270" 1. Start here  PAGEREF _Toc88728270 \h 1  HYPERLINK \l "_Toc88728271" 1.1 Aim of this Guide  PAGEREF _Toc88728271 \h 1  HYPERLINK \l "_Toc88728272" 1.2 What this Guide covers  PAGEREF _Toc88728272 \h 1  HYPERLINK \l "_Toc88728273" 1.3 What this Guide does not cover  PAGEREF _Toc88728273 \h 1  HYPERLINK \l "_Toc88728274" 1.4 If you are new to humanitarian work  PAGEREF _Toc88728274 \h 2  HYPERLINK \l "_Toc88728275" 1.5 If you are more experienced  PAGEREF _Toc88728275 \h 2  HYPERLINK \l "_Toc88728276" 1.6 If you are just visiting the field  PAGEREF _Toc88728276 \h 2  HYPERLINK \l "_Toc88728277" 1.7 A note for senior managers or security advisors  PAGEREF _Toc88728277 \h 3  HYPERLINK \l "_Toc88728278" 1.8 Do I really need a Guide this long?  PAGEREF _Toc88728278 \h 3  HYPERLINK \l "_Toc88728279" 1.9 How to use this Guide  PAGEREF _Toc88728279 \h 3  HYPERLINK \l "_Toc88728280" 2. Introduction to security  PAGEREF _Toc88728280 \h 4  HYPERLINK \l "_Toc88728281" 2.1 What is security?  PAGEREF _Toc88728281 \h 4  HYPERLINK \l "_Toc88728282" 2.2 Why is security important?  PAGEREF _Toc88728282 \h 4  HYPERLINK \l "_Toc88728283" 2.3 Approaches to security  PAGEREF _Toc88728283 \h 4  HYPERLINK \l "_Toc88728284" 2.4 Risk, Threat and Vulnerability  PAGEREF _Toc88728284 \h 5  HYPERLINK \l "_Toc88728285" 2.5 Definitions  PAGEREF _Toc88728285 \h 5  HYPERLINK \l "_Toc88728286" 3. Security preparation for the field  PAGEREF _Toc88728286 \h 6  HYPERLINK \l "_Toc88728287" 3.1 Security assessment before deploying  PAGEREF _Toc88728287 \h 6  HYPERLINK \l "_Toc88728288" 3.2 Prepare a security plan before deploying  PAGEREF _Toc88728288 \h 7  HYPERLINK \l "_Toc88728289" 3.3 Humanitarian space  PAGEREF _Toc88728289 \h 7  HYPERLINK \l "_Toc88728290" 3.4 Consider security aspects of proposed programmes  PAGEREF _Toc88728290 \h 8  HYPERLINK \l "_Toc88728291" 3.5 Selection of staff  PAGEREF _Toc88728291 \h 8  HYPERLINK \l "_Toc88728292" 3.6 Training  PAGEREF _Toc88728292 \h 9  HYPERLINK \l "_Toc88728293" 3.7 Briefing  PAGEREF _Toc88728293 \h 9  HYPERLINK \l "_Toc88728294" 3.8 Equipping  PAGEREF _Toc88728294 \h 10  HYPERLINK \l "_Toc88728295" 3.9 Preparing illiterate staff  PAGEREF _Toc88728295 \h 10  HYPERLINK \l "_Toc88728296" 3.10 Preparing security-related aspects of administration  PAGEREF _Toc88728296 \h 10  HYPERLINK \l "_Toc88728297" 3.11 Offices and warehouses  PAGEREF _Toc88728297 \h 11  HYPERLINK \l "_Toc88728298" 3.12 Staff accommodation  PAGEREF _Toc88728298 \h 11  HYPERLINK \l "_Toc88728299" 3.13 Standard documents and equipment  PAGEREF _Toc88728299 \h 11  HYPERLINK \l "_Toc88728300" 3.14 Personal preparation  PAGEREF _Toc88728300 \h 12  HYPERLINK \l "_Toc88728301" 3.15 Medical preparation  PAGEREF _Toc88728301 \h 12  HYPERLINK \l "_Toc88728302" 4. Security management in the field  PAGEREF _Toc88728302 \h 13  HYPERLINK \l "_Toc88728303" 4.1 Revised security assessment  PAGEREF _Toc88728303 \h 13  HYPERLINK \l "_Toc88728304" 4.2 Revised security plan  PAGEREF _Toc88728304 \h 13  HYPERLINK \l "_Toc88728305" 4.3 Information-gathering  PAGEREF _Toc88728305 \h 13  HYPERLINK \l "_Toc88728306" 4.4 Relations with the local population  PAGEREF _Toc88728306 \h 13  HYPERLINK \l "_Toc88728307" 4.5 Relations with other organisations  PAGEREF _Toc88728307 \h 14  HYPERLINK \l "_Toc88728308" (a) Local authorities  PAGEREF _Toc88728308 \h 14  HYPERLINK \l "_Toc88728309" (b) Local security forces  PAGEREF _Toc88728309 \h 14  HYPERLINK \l "_Toc88728310" (c) Other humanitarian organisations  PAGEREF _Toc88728310 \h 15  HYPERLINK \l "_Toc88728311" (d) The UN security system  PAGEREF _Toc88728311 \h 15  HYPERLINK \l "_Toc88728312" (e) International military forces  PAGEREF _Toc88728312 \h 15  HYPERLINK \l "_Toc88728313" (f) International police force  PAGEREF _Toc88728313 \h 16  HYPERLINK \l "_Toc88728314" (g) Embassies  PAGEREF _Toc88728314 \h 17  HYPERLINK \l "_Toc88728315" (h) Donors  PAGEREF _Toc88728315 \h 17  HYPERLINK \l "_Toc88728316" (i) Local partners  PAGEREF _Toc88728316 \h 17  HYPERLINK \l "_Toc88728317" (j) Security coordination between humanitarian organisations  PAGEREF _Toc88728317 \h 17  HYPERLINK \l "_Toc88728318" 4.6 The Field-Headquarters relationship  PAGEREF _Toc88728318 \h 18  HYPERLINK \l "_Toc88728319" 4.7 Reporting  PAGEREF _Toc88728319 \h 18  HYPERLINK \l "_Toc88728320" 4.8 Security aspects of programme design  PAGEREF _Toc88728320 \h 19  HYPERLINK \l "_Toc88728321" 4.9 Routine security management  PAGEREF _Toc88728321 \h 19  HYPERLINK \l "_Toc88728322" (a) Teamwork  PAGEREF _Toc88728322 \h 19  HYPERLINK \l "_Toc88728323" (b) Staff behaviour  PAGEREF _Toc88728323 \h 19  HYPERLINK \l "_Toc88728324" (c) Female staff  PAGEREF _Toc88728324 \h 20  HYPERLINK \l "_Toc88728325" (d) Rest and Recreation (R&R)  PAGEREF _Toc88728325 \h 21  HYPERLINK \l "_Toc88728326" (e) Stress  PAGEREF _Toc88728326 \h 21  HYPERLINK \l "_Toc88728327" (f) Discipline  PAGEREF _Toc88728327 \h 21  HYPERLINK \l "_Toc88728328" (g) Checkpoints  PAGEREF _Toc88728328 \h 21  HYPERLINK \l "_Toc88728329" (h) Weapons  PAGEREF _Toc88728329 \h 21  HYPERLINK \l "_Toc88728330" 4.10 Technical issues  PAGEREF _Toc88728330 \h 22  HYPERLINK \l "_Toc88728331" (a) Telecommunications  PAGEREF _Toc88728331 \h 22  HYPERLINK \l "_Toc88728332" (b) Vehicles  PAGEREF _Toc88728332 \h 22  HYPERLINK \l "_Toc88728333" (c) Guards  PAGEREF _Toc88728333 \h 23  HYPERLINK \l "_Toc88728334" (d) Fire safety  PAGEREF _Toc88728334 \h 23  HYPERLINK \l "_Toc88728335" 4.11 Administrative issues  PAGEREF _Toc88728335 \h 23  HYPERLINK \l "_Toc88728336" (a) Financial security  PAGEREF _Toc88728336 \h 23  HYPERLINK \l "_Toc88728337" (b) Information security  PAGEREF _Toc88728337 \h 23  HYPERLINK \l "_Toc88728338" (c) Managing keys  PAGEREF _Toc88728338 \h 24  HYPERLINK \l "_Toc88728339" (d) Identity badges  PAGEREF _Toc88728339 \h 24  HYPERLINK \l "_Toc88728340" (e) Procurement  PAGEREF _Toc88728340 \h 24  HYPERLINK \l "_Toc88728341" (f) Corruption  PAGEREF _Toc88728341 \h 24  HYPERLINK \l "_Toc88728342" (g) Consider a Get-you-in team  PAGEREF _Toc88728342 \h 24  HYPERLINK \l "_Toc88728343" 4.12 Travel  PAGEREF _Toc88728343 \h 25  HYPERLINK \l "_Toc88728344" 4.13 Media aspects of security management  PAGEREF _Toc88728344 \h 25  HYPERLINK \l "_Toc88728345" 4.14 Visibility and security  PAGEREF _Toc88728345 \h 25  HYPERLINK \l "_Toc88728346" 4.15 Legal protection of aid workers  PAGEREF _Toc88728346 \h 26  HYPERLINK \l "_Toc88728347" 4.16 Reporting of war crimes  PAGEREF _Toc88728347 \h 26  HYPERLINK \l "_Toc88728348" 5. Security incidents  PAGEREF _Toc88728348 \h 27  HYPERLINK \l "_Toc88728349" 5.1 Security incidents: prevention and reaction  PAGEREF _Toc88728349 \h 27  HYPERLINK \l "_Toc88728350" 5.2 Reporting of incidents  PAGEREF _Toc88728350 \h 27  HYPERLINK \l "_Toc88728351" 5.3 Reporting near miss incidents  PAGEREF _Toc88728351 \h 27  HYPERLINK \l "_Toc88728352" 5.4 Debriefing after an incident  PAGEREF _Toc88728352 \h 27  HYPERLINK \l "_Toc88728353" 5.5 Analysis of incidents and adjustment of procedures  PAGEREF _Toc88728353 \h 27  HYPERLINK \l "_Toc88728354" 5.6 Medical evacuation (Medevac)  PAGEREF _Toc88728354 \h 27  HYPERLINK \l "_Toc88728355" 5.7 Fatal incidents  PAGEREF _Toc88728355 \h 28  HYPERLINK \l "_Toc88728356" 5.8 Investigation of a serious incident  PAGEREF _Toc88728356 \h 28  HYPERLINK \l "_Toc88728357" 5.9 Media handling after a security incident  PAGEREF _Toc88728357 \h 28  HYPERLINK \l "_Toc88728358" 6. Suspension, Hibernation, Relocation, Evacuation  PAGEREF _Toc88728358 \h 28  HYPERLINK \l "_Toc88728359" 6.1 Deciding whether to suspend, hibernate, relocate or evacuate  PAGEREF _Toc88728359 \h 28  HYPERLINK \l "_Toc88728360" 6.2 Suspension of programme activities  PAGEREF _Toc88728360 \h 29  HYPERLINK \l "_Toc88728361" 6.3 Hibernation  PAGEREF _Toc88728361 \h 29  HYPERLINK \l "_Toc88728362" 6.4 Relocation or reduction of staff  PAGEREF _Toc88728362 \h 29  HYPERLINK \l "_Toc88728363" 6.5 Evacuation  PAGEREF _Toc88728363 \h 29  HYPERLINK \l "_Toc88728364" 6.6 Role of the United Nations in evacuation  PAGEREF _Toc88728364 \h 30  HYPERLINK \l "_Toc88728365" 6.7 Debriefing after an evacuation  PAGEREF _Toc88728365 \h 30  HYPERLINK \l "_Toc88728366" 6.8 Media aspects of suspension, hibernation, relocation or evacuation  PAGEREF _Toc88728366 \h 30  HYPERLINK \l "_Toc88728367" 6.9 Return after evacuation  PAGEREF _Toc88728367 \h 30  HYPERLINK \l "_Toc88728368" 7. Closing a programme  PAGEREF _Toc88728368 \h 31  HYPERLINK \l "_Toc88728369" 7.1 Ending staff contracts  PAGEREF _Toc88728369 \h 31  HYPERLINK \l "_Toc88728370" 7.2 Ending other contracts  PAGEREF _Toc88728370 \h 31  HYPERLINK \l "_Toc88728371" 7.3 Legal aspects of programme closure  PAGEREF _Toc88728371 \h 31  HYPERLINK \l "_Toc88728372" 7.4 Disposing of property  PAGEREF _Toc88728372 \h 32  HYPERLINK \l "_Toc88728373" 7.5 Evaluation and inspection  PAGEREF _Toc88728373 \h 32  HYPERLINK \l "_Toc88728374" 7.6 Handover of a programme  PAGEREF _Toc88728374 \h 32  HYPERLINK \l "_Toc88728375" 7.7 Media aspects of closing a programme  PAGEREF _Toc88728375 \h 32  HYPERLINK \l "_Toc88728376" 7.8 Farewell events  PAGEREF _Toc88728376 \h 32  HYPERLINK \l "_Toc88728377" 7.9 Debriefing after programme closure  PAGEREF _Toc88728377 \h 32  HYPERLINK \l "_Toc88728378" 7.10 Archiving documents after programme closure  PAGEREF _Toc88728378 \h 32  HYPERLINK \l "_Toc88728379" 8. Headquarters management of security  PAGEREF _Toc88728379 \h 33  HYPERLINK \l "_Toc88728380" 8.1 Responsibilities of Headquarters for security management  PAGEREF _Toc88728380 \h 33  HYPERLINK \l "_Toc88728381" 8.2 Hierarchy of documents: security policy, manual, plan  PAGEREF _Toc88728381 \h 33  HYPERLINK \l "_Toc88728382" 8.3 Security advisor  PAGEREF _Toc88728382 \h 33  HYPERLINK \l "_Toc88728383" 8.4 Human Resources Management security aspects  PAGEREF _Toc88728383 \h 34  HYPERLINK \l "_Toc88728384" 8.5 Serious or high-profile incidents  PAGEREF _Toc88728384 \h 34  HYPERLINK \l "_Toc88728385" 8.6 International Humanitarian Law  PAGEREF _Toc88728385 \h 34  HYPERLINK \l "_Toc88728386" 8.7 Advocacy and humanitarian space: Headquarters aspects  PAGEREF _Toc88728386 \h 34  HYPERLINK \l "_Toc88728387" 8.8 Archives  PAGEREF _Toc88728387 \h 35  HYPERLINK \l "_Toc88728388" 8.9 Discipline  PAGEREF _Toc88728388 \h 35  HYPERLINK \l "_Toc88728389" 8.10 Duty officer system  PAGEREF _Toc88728389 \h 35  HYPERLINK \l "_Toc88728390" 8.11 Relating to the UN Security System  PAGEREF _Toc88728390 \h 35  HYPERLINK \l "_Toc88728391" 8.12 Relating to donors  PAGEREF _Toc88728391 \h 35  HYPERLINK \l "_Toc88728392" 8.13 Codes and Standards  PAGEREF _Toc88728392 \h 35  HYPERLINK \l "_Toc88728393" 9. Learning and training  PAGEREF _Toc88728393 \h 37  HYPERLINK \l "_Toc88728394" 9.1 Security lessons learned  PAGEREF _Toc88728394 \h 37  HYPERLINK \l "_Toc88728395" 9.2 Evaluations  PAGEREF _Toc88728395 \h 37  HYPERLINK \l "_Toc88728396" 9.3 Training  PAGEREF _Toc88728396 \h 37  HYPERLINK \l "_Toc88728397" (a) Training for new field staff  PAGEREF _Toc88728397 \h 37  HYPERLINK \l "_Toc88728398" (b) Training for field managers  PAGEREF _Toc88728398 \h 37  HYPERLINK \l "_Toc88728399" (c) Training for Headquarters managers  PAGEREF _Toc88728399 \h 37  HYPERLINK \l "_Toc88728400" 9.4 Learning from other agencies and networks  PAGEREF _Toc88728400 \h 37  HYPERLINK \l "_Toc88728401" 9.5 Use of experienced staff as trainers, briefers, advisers, evaluators  PAGEREF _Toc88728401 \h 37  HYPERLINK \l "_Toc88728402" 10. Donors  PAGEREF _Toc88728402 \h 38  HYPERLINK \l "_Toc88728403" 11. Abbreviations  PAGEREF _Toc88728403 \h 39  HYPERLINK \l "_Toc88728404" 12. Important information about this Guide  PAGEREF _Toc88728404 \h 39  HYPERLINK \l "_Toc88728405" 12.1 Acknowledgements  PAGEREF _Toc88728405 \h 39  HYPERLINK \l "_Toc88728406" 12.2 Authors and date  PAGEREF _Toc88728406 \h 39  HYPERLINK \l "_Toc88728407" 12.3 Funding  PAGEREF _Toc88728407 \h 39  HYPERLINK \l "_Toc88728408" 12.4 Copyright  PAGEREF _Toc88728408 \h 39  HYPERLINK \l "_Toc88728409" 12.5 Software and languages  PAGEREF _Toc88728409 \h 39  HYPERLINK \l "_Toc88728410" 12.6 Further copies  PAGEREF _Toc88728410 \h 40  HYPERLINK \l "_Toc88728411" 12.7 ECHO contact  PAGEREF _Toc88728411 \h 40 Annexes: Checklists, Templates and Further Information  HYPERLINK \l "_Toc88728412" A1. Buildings and security  PAGEREF _Toc88728412 \h 42  HYPERLINK \l "_Toc88728413" A2. Checkpoints  PAGEREF _Toc88728413 \h 43  HYPERLINK \l "_Toc88728414" A3. Convoy procedures  PAGEREF _Toc88728414 \h 44  HYPERLINK \l "_Toc88728415" A4. Corruption: avoidance and prevention  PAGEREF _Toc88728415 \h 45  HYPERLINK \l "_Toc88728416" A5. Cultural awareness  PAGEREF _Toc88728416 \h 47  HYPERLINK \l "_Toc88728417" A6. Drivers: a basic checklist  PAGEREF _Toc88728417 \h 48  HYPERLINK \l "_Toc88728418" A7. Emergency contact card  PAGEREF _Toc88728418 \h 49  HYPERLINK \l "_Toc88728419" A8. Equipment for personal security  PAGEREF _Toc88728419 \h 49  HYPERLINK \l "_Toc88728420" A9. Equipment for team security  PAGEREF _Toc88728420 \h 50  HYPERLINK \l "_Toc88728421" A10. Evacuation  PAGEREF _Toc88728421 \h 51  HYPERLINK \l "_Toc88728422" A11. Financial security  PAGEREF _Toc88728422 \h 53  HYPERLINK \l "_Toc88728423" A12. Fire safety  PAGEREF _Toc88728423 \h 55  HYPERLINK \l "_Toc88728424" A13. Guards and private security companies  PAGEREF _Toc88728424 \h 56  HYPERLINK \l "_Toc88728425" A14. Health and hygiene  PAGEREF _Toc88728425 \h 59  HYPERLINK \l "_Toc88728426" A15. Information security  PAGEREF _Toc88728426 \h 60  HYPERLINK \l "_Toc88728427" A16. Insurance for war risks  PAGEREF _Toc88728427 \h 62  HYPERLINK \l "_Toc88728428" A17. International Humanitarian Law (IHL)  PAGEREF _Toc88728428 \h 63  HYPERLINK \l "_Toc88728429" A18. Inventory control  PAGEREF _Toc88728429 \h 64  HYPERLINK \l "_Toc88728430" A19. Media and security  PAGEREF _Toc88728430 \h 65  HYPERLINK \l "_Toc88728431" A20. Medical evacuation (Medevac)  PAGEREF _Toc88728431 \h 66  HYPERLINK \l "_Toc88728432" A21. Next of Kin records  PAGEREF _Toc88728432 \h 67  HYPERLINK \l "_Toc88728433" A22. Next of Kin: procedure for informing them  PAGEREF _Toc88728433 \h 67  HYPERLINK \l "_Toc88728434" A23. People In Aid Code: Principle Seven  PAGEREF _Toc88728434 \h 69  HYPERLINK \l "_Toc88728435" A24. Radio procedures  PAGEREF _Toc88728435 \h 70  HYPERLINK \l "_Toc88728436" A25. Rest and Recreation (R&R)  PAGEREF _Toc88728436 \h 72  HYPERLINK \l "_Toc88728437" A26. Security Assessment  PAGEREF _Toc88728437 \h 73  HYPERLINK \l "_Toc88728438" A27. Security briefing  PAGEREF _Toc88728438 \h 76  HYPERLINK \l "_Toc88728439" A28. Security incidents: prevention and reaction  PAGEREF _Toc88728439 \h 77  HYPERLINK \l "_Toc88728440" (a) Accidents  PAGEREF _Toc88728440 \h 77  HYPERLINK \l "_Toc88728441" (b) Air attack  PAGEREF _Toc88728441 \h 78  HYPERLINK \l "_Toc88728442" (c) Air crash  PAGEREF _Toc88728442 \h 79  HYPERLINK \l "_Toc88728443" (d) Ambush  PAGEREF _Toc88728443 \h 79  HYPERLINK \l "_Toc88728444" (e) Arrest or detention  PAGEREF _Toc88728444 \h 81  HYPERLINK \l "_Toc88728445" (f) Assault  PAGEREF _Toc88728445 \h 82  HYPERLINK \l "_Toc88728446" (g) Bomb  PAGEREF _Toc88728446 \h 82  HYPERLINK \l "_Toc88728447" (h) Bomb threat by telephone  PAGEREF _Toc88728447 \h 83  HYPERLINK \l "_Toc88728448" (i) Chemical, biological or radiological attack  PAGEREF _Toc88728448 \h 84  HYPERLINK \l "_Toc88728449" (j) Crowds  PAGEREF _Toc88728449 \h 84  HYPERLINK \l "_Toc88728450" (k) Earthquake  PAGEREF _Toc88728450 \h 84  HYPERLINK \l "_Toc88728451" (l) Fighting  PAGEREF _Toc88728451 \h 84  HYPERLINK \l "_Toc88728452" (m) Fire  PAGEREF _Toc88728452 \h 86  HYPERLINK \l "_Toc88728453" (n) Flood  PAGEREF _Toc88728453 \h 86  HYPERLINK \l "_Toc88728454" (o) Fraud  PAGEREF _Toc88728454 \h 86  HYPERLINK \l "_Toc88728455" (p) Grenade  PAGEREF _Toc88728455 \h 87  HYPERLINK \l "_Toc88728456" (q) Hijack vehicles  PAGEREF _Toc88728456 \h 87  HYPERLINK \l "_Toc88728457" (r) Hijack aircraft  PAGEREF _Toc88728457 \h 88  HYPERLINK \l "_Toc88728458" (s) Kidnap  PAGEREF _Toc88728458 \h 89  HYPERLINK \l "_Toc88728459" (t) Looting  PAGEREF _Toc88728459 \h 91  HYPERLINK \l "_Toc88728460" (u) Medical emergency  PAGEREF _Toc88728460 \h 91  HYPERLINK \l "_Toc88728461" (v) Mines, booby traps and unexploded ordnance (UXO)  PAGEREF _Toc88728461 \h 91  HYPERLINK \l "_Toc88728462" (w) Rape and sexual violence  PAGEREF _Toc88728462 \h 92  HYPERLINK \l "_Toc88728463" (x) Robbery  PAGEREF _Toc88728463 \h 93  HYPERLINK \l "_Toc88728464" (y) Sexual harassment  PAGEREF _Toc88728464 \h 94  HYPERLINK \l "_Toc88728465" (z) Shooting  PAGEREF _Toc88728465 \h 94  HYPERLINK \l "_Toc88728466" (aa) Terrorism  PAGEREF _Toc88728466 \h 94  HYPERLINK \l "_Toc88728467" (bb) Weapon finds  PAGEREF _Toc88728467 \h 95  HYPERLINK \l "_Toc88728468" A29. Security incidents and near misses: report format  PAGEREF _Toc88728468 \h 95  HYPERLINK \l "_Toc88728469" A30. Security manuals  PAGEREF _Toc88728469 \h 96  HYPERLINK \l "_Toc88728470" A31. Security plan  PAGEREF _Toc88728470 \h 97  HYPERLINK \l "_Toc88728471" A32. Security policy  PAGEREF _Toc88728471 \h 99  HYPERLINK \l "_Toc88728472" A33. Shelters  PAGEREF _Toc88728472 \h 100  HYPERLINK \l "_Toc88728473" A34. Sitrep format  PAGEREF _Toc88728473 \h 101  HYPERLINK \l "_Toc88728474" A35. Stress  PAGEREF _Toc88728474 \h 101  HYPERLINK \l "_Toc88728475" A36. Syllabus for a basic security training course  PAGEREF _Toc88728475 \h 103  HYPERLINK \l "_Toc88728476" A37. Syllabus for a security course for field managers  PAGEREF _Toc88728476 \h 104  HYPERLINK \l "_Toc88728477" A38. Threat Impact Chart  PAGEREF _Toc88728477 \h 105  HYPERLINK \l "_Toc88728478" A39. Travel authorisation format  PAGEREF _Toc88728478 \h 107  HYPERLINK \l "_Toc88728479" A40. UN security procedures  PAGEREF _Toc88728479 \h 107  HYPERLINK \l "_Toc88728480" A41. UN-NGO Security Collaboration: Menu of Options  PAGEREF _Toc88728480 \h 110  HYPERLINK \l "_Toc88728481" A42. Vehicle equipment  PAGEREF _Toc88728481 \h 111  HYPERLINK \l "_Toc88728482" INDEX.  PAGEREF _Toc88728482 \h 113  Note: This is a Word version of the Generic Security Guide, offered to users to allow easy adaptation. The primary version is in Adobe Acrobat (.pdf) format, available on CD-ROM and as a download from the internet. See Chapter 12 for details. Start here Aim of this Guide The aim of this Guide is to help humanitarian organisations to manage their security well. It does this by offering suggested guidance, tools and resources, designed to assist organisations to think through their security policies and procedures. It is intended to be adapted, by those responsible for security management, to suit the needs of a particular organisation and situation. It does not cover every possible situation, organisation or eventuality. But since there are some common features to many insecure situations, a generic Guide of this kind can be helpful in suggesting, prompting, reminding and offering useful tools. It is not intended as a standard or a requirement for any organisation. The design of the Guide was decided after consultation with a wide range of humanitarian organisations. Accordingly, it aims tocombine the following qualities: Highly practical guidance,avoiding theory, but with reasons given where this is helpful Bullet point checklists wherever possible, for ease of use Simple, clear language Accessible and easy to navigate, with detailed Table of Contents and Index Designed to be adapted by humanitarian organisationsto their particularneeds Illustrated, user-friendly layout Equal emphasis on nationally-recruitedand international staff Step-by-step approach for all levels, with specific sections for new humanitarian staff all the way through to senior managers Existing documents and resources are referred to where these may be of further help The Guide is complemented by a Report on the security of humanitarian personnel and a Security Training Directory XE "Security Training Directory" . While the primary intended audience is those responsible for the security management of an entire humanitarian organisation, the Guide may also be of use, as a reference document, to: Field-based humanitarian managers Field-based humanitarian workers Visitors to the field Managers at Headquarters What this Guide covers This Guide aims to cover most aspects of security management and practice that are commonly thought relevant to humanitarian organisations working in emergencies in the field, in most parts of the world. The Guide is based on existing good practice. It draws extensively from security manuals and other documents produced by a wide variety of humanitarian NGOs, UN agencies and the Red Cross / Crescent Movement. National and international staff are covered equally XE "National staff"  in this Guide. Where a point refers to one or other group only, this is made explicit. Otherwise, all sections refer to all staff. This Guide is about security rather than health and safety. But it would make little sense to manage security well while taking no fire precautions, for example. Accordingly, this Guide mentions basic fire precautions, and some other health and safety issues relevant to protecting humanitarian staff. What this Guide does not cover The Guide does not cover aspects of security management or practice that are specific to particular locations, cultures, or types of humanitarian operation. Instead it focuses on generic aspects that may be applicable in a wide variety of situations. It is always important to consider whether the generic points mentioned in this Guide need adapting to suit a particular situation. The Guide does not aim to cover health and safety, except for a few selected issues which can pose serious threats to life. Readers should be aware that in many cases health issues pose the most serious risk XE "Risk"  to life, and should take precautions accordingly. The Guide does not discuss the security or protection of local populations, refugees, children or other vulnerable people. The Guide is aimed at humanitarian organisations, and therefore does not take into account the particular needs of those working on development programmes. Most importantly, the Guide is no guarantee of security. Using the Guide does not replace the need for appropriate training XE "Training" , experience and judgement, coupled with the relevant equipment and procedures, applied as each situation demands. Please read and note the disclaimer, inside the front cover. If you are new to humanitarian work Benefits and risks XE "Risk"  Humanitarian work, if done well, saves lives and relieves suffering. It is often also an enjoyable and rewarding experience for those who bring the assistance. At the same time, in many countries there are serious threats to XE "Threat"  humanitarian staff. The great majority of humanitarian staff carry out their work without coming to harm. But some have become sick, some have been injured, some have been held hostage, and some have been killed while doing their work. Responsibility Each individual is responsible for security. Humanitarian staff at every level are responsible for doing all they can to ensure their own security, as well as the security of their colleagues and others. The actions of one person can have an effect on the security of others in the same organisation, members of other organisations, and local people. Line managers at all levels XE "Managers"  are responsible for ensuring the security of their team as a whole. To help them in this task, they may delegate some security-related functions, or take advice from a colleague who specialises in security matters. But the main responsibility for the teams security should belong to the line manager. Reducing risk It is not possible to eliminate risk, but it is usually possible to reduce it. A passenger in a car reduces risk by wearing a seatbelt and ensuring that there is a competent driver, but knows that some risk remains. In a similar way, humanitarian staff can take precautions to reduce risks, but can never reduce them to zero. In some cases, whatever precautions are taken, the risks remain high. Humanitarian workers learn to balance risk against benefit. If the likely benefit of your work is great (for example, it will save many lives) and the risk is small, then you will probably decide to go ahead and do the work. But if the likely benefit is small and the risk is great, you will normally decide not to do the work, since it is not worth the risk. As a new humanitarian worker, you will need to learn to assess risk, to assess the likely benefit that your work will bring, and to weigh the one against the other. The ability to do this is mainly learned by experience in insecure situations in the field. Those with little or no such experience rely on their manager or supervisor to assess risk on their behalf. It is important for humanitarian staff at all levels to accept proper supervision in security matters, and to support managers in this task. It is also vital that managers and supervisors are fully competent to assess and manage risk on behalf of their teams. Preparing for insecure situations Those about to gain their first humanitarian field experience can and should do a great deal to prepare themselves for work in insecure situations. Preparation falls into three main categories: Training teaches you XE "Training"  skills, and practises you in them until you can do them yourself Briefing gives you information XE "Security briefing" , for example about a particular country, culture, and security situation, about your organisation and about the humanitarian situation on the ground Equipping provides equipment that you may need, to help enhance your security It is vital that new humanitarian workers make themselves available for training, briefing and equipping; read training and briefing materials thoroughly; and ensure that they understand them. Dont hesitate to ask your manager any questions you may have it may save your life. If any part of security preparation appears to have been omitted, raise this with your manager. Busy managers can sometimes be tempted to make short cuts. Dont be afraid to insist on proper security preparation. You will find more detail about appropriate training, briefing and equipping in Chapter 3 of this Guide. Further resources are available in the annexes. Your organisation should provide XE "Security manual"  XE "Manual (security manual)"  you with a security manual or handbook and all other security-related information you need. If so, it should not be essential for you to read this Guide. But it may be useful as a reference manual, and to help to fill any gaps there may be in the guidance that you are given. Your comments on this Guide, particularly on how it could improve in usefulness to new humanitarian staff, are most welcome and should be addressed to the ECHO contact on security matters (see Section 12). If you are more experienced If you already have experience with a humanitarian organisation in an insecure location, this Guide may provide information or suggest ideas that are new to you, or remind you of points that you already know. Your comments are most welcome and should be addressed to the ECHO contact on security matters (see Section 12). If you are just visiting the field Visitors to the field face XE "Visitors: threats to"  as many threats XE "Threat: threats to visitors"  as field-based staff, and sometimes more. It is vital that you ensure that you are properly prepared for your visit, and that an appropriate and competent person takes responsibility for your security. Your comments on the Guide, particularly on how it could improve in usefulness to field visitors, are most welcome and should be addressed to the ECHO contact on security matters (see Section 12). A note for senior managers or security advisors This Guide is intended to help you XE "Security advisor"  XE "Managers: senior managers"  XE "Managers" . Your organisation may have appropriate security policies and practices in place, with field and Headquarters staff maintaining high standards of security. If so, you may wish to use this Guide simply as a comparison, or to double-check that nothing has been forgotten. At the other end of the spectrum, your organisation may be conscious that it needs to make considerable improvements to its security management. The large number of procedures contained in this Guide may appear daunting or even unrealistic. If so, please be reassured by the following comments: Not all procedures are necessary for all organisations or all locations. The contents of this Guide should be adapted and in some cases shortened to meet your particular needs. Help is available, if you need it. Training organisations and consultants are two possible sources of help. (See the Security Training Directory XE "Security Training Directory"  which accompanies this Guide, for some examples of these.) If many changes are needed in your organisation, you may consider appointing a change manager to ensure that the improvements are made. This would free you and other senior managers to do your normal tasks. If the chief executive or board of directors XE "Directors of a humanitarian organisation"  supports good security management and allocates the necessary staff and resources, the task of implementing it becomes much easier. Take time to win their commitment. Finally, ask yourself if your organisation can afford not to manage security well? Lives are at stake. Your staff will do a better job if they are secure, leading to better assistance to those who need it. A failure by management to address security, or health and safety risks, may expose you to legal action. This may carry a risk of your organisation being bankrupted by successful lawsuits XE "Legal risks" . Do I really need a Guide this long? Security management should be kept as simple as possible, and yet there are many issues which need to be taken into account. Your organisation should provide XE "Security manual"  XE "Manual (security manual)"  you with a security manual or handbook which meets your needs. If so, this Guide may be useful simply as an extra reference manual. Only use the sections which are helpful and relevant to your organisation and your situation, and adapt them as appropriate. If you have no security manual, the idea is that the Guide should make it easier for senior managers to create a security manual of appropriate length and detail for their organisation. It should also help them to design relevant security policies, procedures and plans. How they do so is a matter for their judgement, and they will need to select, change, adapt and add to material found in this Guide. Finally, there may be some immediate improvements you can make in the way that security is managed, or staff are prepared for their work. Dont let changes that will take longer prevent you from making those immediate improvements as soon as possible. How to use this Guide This Guide is intended to help humanitarian organisations to think through their security policies and procedures. Senior managers with security responsibilities may wish to use the whole Guide, to help them to design a security policy, a security manual and other procedures for their organisation. Other users may prefer to use the Guide as a reference manual, to provide easily accessible help on a particular topic when the need arises. With this in mind, the Guide has several methods of finding the topic you are looking for: A table of contents A substantial index References and links within the text In the Word and pdf versions, you can search for a particular word or phrase using the search facility provided by those programmes. Select Edit then Find, or press Ctrl-F (i.e. hold down Ctrl and press F). The Guide has a large number of annexes, containing helpful checklists, which can be adapted to your needs. All users are welcome to use extracts from this Guide in their own documents, adapted as necessary to their own needs. This is subject to the disclaimer, to be found inside the front cover, and the copyright notice at section 12.4. Introduction to security What is security? For the purposes of this Guide, security is the protection XE "Security definition"  of humanitarian personnel and assets from violence and theft. Why is security important? Serious security incidents place humanitarian staff and property at risk. Any responsible employer will wish to take all reasonable steps to protect the lives of its staff, and to protect its assets. Serious or unanticipated security incidents also place the provision of assistance at risk, with the danger that humanitarian assistance for needy populations may be curtailed or suspended. If humanitarian staff are secure, they are able to do a more effective job in bringing assistance to those who need it. Approaches to security Acceptance Traditionally XE "Acceptance approach to security" , humanitarian organisations have relied for their security on the goodwill of the local population XE "Local population" . This is still the favoured approach where possible. If the local population support the work that the humanitarian organisations are doing in their area, they will not threaten them but help them. This approach is often known as the acceptance approach, since it depends on acceptance by the population. To win acceptance, humanitarian staff may need to spend considerable time listening to local people, and explaining their role to local leaders and residents, both directly and via the media. This may include negotiation of access XE "Negotiation"  to areas of need; explanation of the humanitarian principles underlying the work; and response to rumours or accusations when they arise. The acceptance approach is usually not enough on its own. Every society contains some people who resort to crime XE "Crime" , and humanitarian staff and property may be targeted by criminals. The most frequent crime against them is probably theft XE "Theft" , since they are sources of money and valuable goods in the midst of poverty. Sometimes they are the target of more serious threats such as assault, rape XE "Rape" , kidnapping or even murder. Protection Therefore, even XE "Protection approach to security"  when there is wide local support for humanitarian organisations, they need at least some protection. Common protection measures include gates, guards, locks and safes. Other protection measures are decided on according to the threat in each specific context. When there is not complete local support for the humanitarian organisations, a higher degree of protection is necessary if the work is to continue. In this case managers will usually consider whether the work should stop, either temporarily or permanently. There may be some threats XE "Threat"  to humanitarian organisations which do not arise from the local community at all. These may include natural hazards such as disease, volcanic eruptions or floods. They may also include attacks from terrorist groups, whose decision-makers may be distant or even in a different country, orchestrating violence against humanitarian and other organisations for political reasons. If so, protection measures will need to take these threats into account. Deterrence Deterrence is XE "Deterrence approach to security"  a further security approach used by some organisations, notably the police and the military. They deter attack by threatening retaliation against anyone who attacks them. This is not an option available to humanitarian organisations, whose principles forbid them to attack anyone, or to threaten attack. The sole possible exception is when humanitarian organisations use armed guards, in extreme circumstances when there is no other way to protect staff and property (see Annex 13). A guard carrying a weapon XE "Weapons"  is a type of deterrent: this is the only method by which humanitarian organisations may legitimately use deterrence. Thinking long-term Humanitarian managers try to keep in mind the long-term impact of their decisions about security. They aim to ensure that staff and property are safe, while upholding humanitarian principles, nurturing good relationships with local people, and bringing closer the day when outside assistance will no longer be needed. Risk, Threat and Vulnerability It can be helpful to distinguish between risk XE "Risk" , threat and vulnerability by defining them as follows: Threat: a danger to you, your organisation or your property Vulnerability: your level of exposure to a particular threat Risk: XE "Risk"  the likelihood and impact of encountering a threat For example, there may be a threat of theft XE "Theft" . Your vulnerability to that threat depends on various factors including what money or valuable property you possess; whether potential thieves know about it; whether your neighbours will warn you of the potential for theft in the area; whether you have good locks and safes; whether you have efficient guards; etc. The risk that you will suffer from the theft depends both on the level of threat, and your level of vulnerability to that threat. This is sometimes expressed in the relationship: Risk = Threat x Vulnerability You may be able to do nothing about the level of threat around you, but you can probably do a great deal to reduce your level of vulnerability in two main ways: Reducing the chances of an incident happening (e.g. by driving slowly, improving locks, or introducing a neighbourhood watch system) Reducing the impact of an incident (e.g. by wearing seatbelts, or limiting the amount of cash held in the safe) By reducing your vulnerability, you reduce the risk that the threat will become reality and have a serious impact on you. A major part of good security management is reducing vulnerability in every way possible. Definitions For the purposes of this Guide, the terms below are defined as follows. Humanitarian space: The access and freedom for humanitarian organisations to assess and meet humanitarian need. Security: The protection of humanitarian personnel and assets from violence and theft. Security policy: A short XE "Security policy"  document approved by the top management and board of trustees of a humanitarian organisation, setting out the organisations overall approach and principles in relation to security. Security manual: XE "Security manual"  XE "Manual (security manual)"  A handbook giving generic security procedures to be applied by all staff, but not including location-specific procedures. (The handbook may be a relatively long document.) Security plan: A short XE "Security plan"  document giving location-specific security information and procedures, that do not feature in the security manual. A separate security plan is produced for each field location. Security incident: An event which threatens humanitarian staff or assets with violence or theft, or results in actual violence or theft against them. Security preparation for the field Security assessment before deploying The team leader normally carries out a security assessment before a final decision is taken to deploy, and certainly before the arrival of the main team. It is done preferably by an assessment visit and, where a visit is not possible, by remote assessment. If a team is XE "Security assessment"  XE "Preparation for the field"  already in the area, for example carrying out a development programme before the emergency began, then their existing security assessment should be used to inform the security assessment for the humanitarian team. The aim of the security assessment is to understand the situation sufficiently to enable the team to plan their security measures appropriately. Assessment visit A security assessment visit should be long enough to achieve its aim. Factors influencing the length of the visit include: The level of insecurity The experience of the person/people making the assessment The number of people making the assessment Geographical size of the area Complexity of the political situation Weather Other local events, e.g. holidays, festivals Availability of key interlocutors such as local leaders Availability of transport Availability of good maps The severity of humanitarian need. If many people are dying, a more rapid security assessment may sometimes be necessary, to allow the programme to begin as soon as possible but this is a matter for careful judgement since too rapid an assessment can be dangerous. A security assessment can be combined with other aims, for example a needs assessment. Remote assessment A remote assessment (i.e. an assessment without visiting the area concerned), may occasionally be necessary, if a visit is not possible. It should seek to answer the same questions as an assessment visit. It is much harder to do so because it is not possible to talk to the same people, or in the same way, if one is limited to telecommunications. A remote assessment is therefore much less reliable than an assessment visit, and is no substitute for a visit if possible. A remote assessment should be checked and revised as necessary, as soon as the first staff deploy. Assessment method A suggested method for a security assessment is at Annex 26. Prepare a security plan before deploying A security plan should XE "Security plan"  be produced, at least in outline form, before a team deploys to a new location. It should then be modified as the team gets to know the situation better. Ideally, all staff should have an opportunity to contribute to the security plan. In practice this is not always possible. But experience has shown that staff who participate in the design of a security plan produce a better plan, and are more likely to follow it. The aim of a security plan is to provide staff with a concise document which sets out the security rules and procedures applying to the location(s) where they are working. It must be short (many experienced field managers say it should be less than 10 pages, excluding annexes), otherwise it is likely that some staff will not read it. Each organisation decides its own format for a security plan. A possible suggested format is at Annex 31. The security plan should give context-specific rules and procedures, and normally should not give generic security advice which would make the security plan too long. Each literate XE "Security manual"  XE "Manual (security manual)"  staff member should have a generic security manual or handbook that has been approved by the employing organisation. This is a much longer document than a security plan. It gives detailed advice on a wide variety of security issues. All staff should be familiarised with the relevant parts of it as part of their security training, before they start work. See Annex 30 for examples of security manuals and handbooks. In addition, guidance on the organisations overall attitude to security should be written in a security policy. The hierarchy of security documents is thus: Security policy giving overall policy and principles for the organisation (see Annex 32 for a suggested format for a security policy) Security manual giving generic procedures for the organisation Security plan giving detailed procedures for a specific location Humanitarian space For the purposes of this Guide, humanitarian space is defined XE "Humanitarian space"  as the access and freedom for humanitarian organisations to assess and meet humanitarian need. In some situations it is necessary to negotiate with leaders or local people to be allowed access to the areas of humanitarian need. When negotiating, it is important not to compromise on fundamental humanitarian principles, as set out for example in the Red Cross / Crescent / NGOs Code of Conduct XE "Code of Conduct" . One objective of these negotiations XE "Negotiation"  will usually be to verify that local leaders and groups will do whatever is necessary to ensure the safety of humanitarian staff. Sometimes humanitarian principles may conflict, for example if providing assistance on the basis of need alone is not in accordance with respecting local customs. In such cases, good judgement and common sense are needed, perhaps with advice from experienced colleagues. If relief goods have to travel through areas which are not receiving assistance, in order to reach the most needy areas, local people in the areas being transited sometimes demand a share of the aid. Such demands can lead to violence if not well handled. They are best prevented by negotiations in advance with the representatives of those areas, ensuring that people understand the planned assistance and the reasons for it. Preventing misunderstandings is better than trying to resolve them once they arise. But if they do arise, quick action is necessary, to prevent an escalation of the problem. Humanitarian organisations should always conduct negotiations with integrity. Bribes or other inducements should never be given in return for access. They are wrong in principle, and in practice usually lead to demands for further bribes. Instead, any group or individual denying access should be reminded of their responsibilities to allow humanitarian assistance to reach those who need it. The actions of one humanitarian organisation often affect the work of other organisations. Consulting other relevant organisations is therefore essential, before negotiating with local leaders for access or wider issues of humanitarian space. In some cases a local code of conduct has been agreed among operational agencies so that everyone is working on the same agreed basis and can avoid being played off against each other. Most importantly, the local population can be endangered XE "Local population"  by the actions of humanitarian organisations. For example, communicating the locations of refugees or going to help them might lead armed groups to them, who may then attack them. It is crucial to be aware of the local situation, and the aims of different leaders and groups, before negotiating with them. Consider security aspects of proposed programmes When preparing for the field, consider the security XE "Programme design security aspects"  aspects of the programmes you expect to be involved in. A number of possible aspects are listed under Security aspects of programme design in Chapter 4. Selection of staff The quality and appropriateness XE "Staff: importance of quality staff"  XE "Recruitment"  of staff are probably the greatest single factors influencing the security of humanitarian work (and its effectiveness). Great care is therefore needed when selecting staff. The same principles of staff selection apply both to nationally- and internationally-recruited staff, though their implementation may differ according to the post advertised, and local circumstances. Good selection makes security management much easier. Poor selection makes it more difficult to manage security well. Rigorous checking of candidates references is vital. It helps to ensure that those with a previous record of dishonesty, or other security-related problems, are identified and not employed. In accordance with the principles of equal XE "Equal opportunity"  opportunity, the nationality or ethnic group of a candidate should normally have no bearing on whether he or she is employed. Nevertheless, if a team as a whole is perceived as having an unfairly high proportion of one nationality or ethnic group, some staff and local opinion may suspect that biased selection has taken place. That suspicion could in turn have an impact on staff security. This is a sensitive issue, which requires a clear and fair policy decision by senior managers, in line with applicable employment law XE "Legal aspects of employment"  XE "Employment laws and disputes" . In some cases it may be legal, for example, to adopt a policy that for reasons of security and effectiveness, the staff team should reflect a reasonable mix of local ethnic groups, and to allow this policy to influence recruitment decisions. In some situations, security may be enhanced by employing staff mainly from a particular ethnic group for example if the programmes are aimed at displaced people from one ethnic group, who are in conflict with other ethnic groups in the area. If so, this consideration should be weighed against considerations of equal opportunity, and a careful decision made. As a general rule, qualified national staff XE "National staff: recruitment"  should be preferred for all posts unless there is a good reason to employ international staff for a particular post. This is likely to make the programme more sustainable, more culturally appropriate and more cost-effective, therefore more acceptable to local people and more secure. Each situation will have its own characteristics. There have been examples where the government or a local political group have infiltrated NGOs by ensuring that their agents are recruited as national staff. This can have a serious effect on the real and perceived impartiality of the organisation, as well as its security. In other contexts, international staff of a certain nationality may be unacceptable for political reasons. Managers must try to be aware of such issues, and bear them in mind when recruiting. Timely employment of the necessary staff is often a great challenge for humanitarian organisations. If key posts remain vacant it can cause dissatisfaction among other staff, or among local people as they see programme delays resulting. Risks to staff can then increase. Proper recruitment is not easy during an emergency, and includes the following factors: Accurate job descriptions XE "Job descriptions" , including any security-related responsibilities Accurate person specifications, including any security-related skills or experience that are required A fair and transparent recruitment process so that there can be no accusations of bias Adequate advertising of the vacancy Appropriate interviews and tests Rigorous checking of references before a contract is signed and before the candidate starts work. This is difficult to achieve, and sometimes impossible, during the height of an emergency. Be aware of the danger of employing someone who has been found to be dishonest, for example, by a previous employer. A follow up of references by phone or in person is often the most practical and effective way to check on a previous record. One issue that often leads to tension is failure to inform unsuccessful candidates. Contract documents conforming to applicable laws and regulations, and meeting the needs of both the organisation and the employee. It is helpful if the organisation provides a standard contract XE "Standard contracts"  XE "Contracts: standard contracts"  text, which can be adapted to the local context and legal requirements. Without standard texts, writing contracts XE "Contracts"  from scratch can be very difficult for hard-pressed managers in an emergency. In many cases it is advisable for humanitarian organisations to use a local employment law XE "Legal aspects of employment" yer XE "Employment laws and disputes"  to check contract terms, to advise on local employment practice and to assist in preventing or dealing with any employment disputes. Employment disputes and resulting legal action can be a very time-consuming distraction for humanitarian organisations, and can have security implications as disgruntled former employees, for example, resort to threats or violence. Emergency contracts are often short in duration. It is important to point out, and have written down, that an appointment may be temporary and there can be no guarantee of long term employment. Contracts should contain a clause stating that employment may be terminated at short notice, for example if insecurity forces a programme to close. Check with employment laws XE "Legal aspects of employment"  XE "Employment laws and disputes"  about what severance payments are required, and make these clear in the contract. Anticipate potential employment disputes XE "Employment laws and disputes"  before they arise so that you have at least the law and documentation on your side. In some circumstances it may be necessary to have signed witnesses to contracts. Training Perhaps the second XE "Training"  greatest contributor to security, after the selection of high-quality and appropriate staff, is training. It is a management responsibility to ensure that all staff have received any training that is necessary for their work. This requires careful judgement. Staff with significant field experience may need less training than staff who are new to insecure situations. But even experienced staff sometimes lack some elements of training which may be essential in the situation they are intending to work in. New field staff who are due to work in an insecure situation will normally require training to a basic level in at least the following skills XE "Training: for field staff"  XE "Syllabus: for field staff" : The 'humanitarian system including the UN agencies, Red Cross/Crescent Movement Assessing security threats XE "Threat: training"  Awareness of the most common types of security threat Understanding the acceptance approach to security Respecting culture and custom Basic language skills, if possible Precautions at home and office Driving a 4-wheel drive vehicle Precautions when driving Procedures at checkpoints Reacting to the most common types of security incident Dealing with the military Dealing with rebel/irregular troops Radio handling and voice procedure Equipment that every vehicle should carry Basic vehicle checks Changing a wheel Health and hygiene in the field Handling stress XE "Stress" , including in a team context Programme suspension, hibernation and evacuation Medical evacuation A Security Training Directory XE "Security Training Directory"  accompanies this Guide. A suggested detailed syllabus for a basic security training course is at Annex 36. In a fast-moving emergency, there will be a limit to how much training can be provided in the field. This means that it may be very difficult to devote the time to train nationally-recruited staff in all of the above skills. The team managers judgement will determine what topics are essential in the circumstances. He or she should ensure that enough time is set aside, with an appropriate trainer, to ensure that everyone has whatever training is necessary for their function. If there is no other option, in the last resort he or she should conduct the training, customised to the needs of the staff and the facilities available. Internationally-recruited staff should either have received appropriate training before being employed, or should receive it once employed, before starting work in an insecure situation. There is often great pressure on humanitarian organisations to deploy staff quickly, and a shortage of available trained staff. Senior managers should predict XE "Managers: senior managers"  their organisations need for security-trained staff, and aim to ensure that enough staff are provided with security training in advance, to allow rapid deployment at the outset of an emergency. See the Security Training Directory XE "Security Training Directory"  which accompanies this Guide, for information on security training providers, courses and resources XE "Security briefing" . Briefing The aim of security briefing is to enable staff to understand the local situation sufficiently to live and work safely in it. A security briefing should be given to all internationally-recruited staff before they travel to an insecure location. This briefing should be as thorough as possible, but usually can not be as detailed as a security briefing on the ground. It should be accompanied by at least basic written information, to remind them of points that they may not have taken in during face-to-face briefing. On arrival, a further security briefing should be given which goes into greater detail and gives fully up-to-date information on the situation. In addition to security training, nationally-recruited staff should receive a full security briefing before they start work. In some circumstances it may be necessary to provide a security briefing to the family members of staff, either directly or through the staff member concerned. A suggested checklist for security briefing is at Annex 27. Equipping The security equipment necessary XE "Equipment: general"  will depend on the situation, and the type of work envisaged. A checklist of personal security-related equipment is at Annex 8. A checklist of team security equipment is at Annex 9. Both national and international staff should be provided with the equipment necessary for their security. A key item, in most contexts, is suitable vehicles. Whether owned or hired, they should be thoroughly checked by a competent mechanic, for roadworthiness and correct equipment. See Annex 42 for a suggested list of vehicle equipment. Secure stores for equipment will be needed from the outset. Staff should be discreet about the presence of any valuable equipment. Inventory control of equipment XE "Inventory control"  is necessary to reduce theft XE "Theft"  and loss which result in considerable cost to humanitarian programmes. It is at the start of the crisis, and when the emergency is most pressing, that this issue becomes even more difficult than usual. A good system, prepared in advance, and a named staff member with the proper briefing and training, help to ensure good inventory control in even the toughest situations. Poor inventory control can have a direct impact on security, for example if vital communications equipment is lost or stolen. It is also an indicator of a poorly managed operation. See Annex 18 for suggested inventory control procedures. Preparing illiterate staff Security preparation for illiterate XE "Illiterate staff"  staff XE "Staff: illiterate staff"  should be adapted to their role, needs, skills and knowledge. Creative adaptation of training, briefing and equipping should ensure that they are well prepared to work in safety. The manager should decide which posts may be filled by illiterate staff, and which require literacy. Preparing security-related aspects of administration Certain aspects of administration have a bearing on security. These include: Creating and maintaining proper records, with copies both at Headquarters (HQ) and in the field, including: Accounting XE "Financial security"  records XE "Financial security: accounting records"  Sensitive documents XE "Sensitive documents"  such as financial or personnel records XE "Personnel records"  Up-to-date Next of Kin records XE "Next of Kin: Next of Kin records"  Copies of passports including visas Copies of airline tickets Health records of all staff, including blood groups XE "Blood group"  Equipment inventory Full details including serial numbers of all high-value assets such as vehicles, computers and communications XE "Telecommunications"  equipment. It may be necessary to take invoices or proof of ownership to the field, to present to customs authorities XE "Contracts" . Staff contracts Other contracts Copies of staff driving licences List of addresses, phone numbers and radio frequencies Maintenance of up-to-date insurance XE "Insurance"  (see Annex 16 for information on war risks insurance). All staff should receive a copy of the insurance policy, and understand its meaning and the level of benefits provided. Note that failure to maintain adequate insurance could lead to large claims being made against an employer, which in some cases could drive the employer into bankruptcy. Ensuring that recruitment XE "Recruitment"  and employment procedures follow all applicable laws Financial aspects: Budgeting for security-related expenditure Cash carriage XE "Cash"  and storage How will money be handled? What quantity of cash will be needed, and how will it be kept safe? Procedures for authorising expenditure and cash movement What communications equipment will XE "Telecommunications"  be needed? What types and quantities of vehicles will be needed? What will they need to be equipped with? How many national staff drivers will be required? What skill and experience does the team need to possess? Do any organisations need to be informed of our plans? What permissions do we need to obtain before deploying, or soon after deploying? What documents do staff members need to possess? Creation of identity cards for staff, with expiry dates Creation of information cards in local languages, explaining the mission and values of the organisation. These can be helpful for staff when crossing checkpoints, or meeting with local leaders or communities. Creation of emergency contact cards XE "Emergency contact card"  for staff, in relevant languages see Annex 7 for an example Keep track of which XE "Training: administration of"  team members have received appropriate security training Plan security briefing times for all team members and keep track of who has been briefed It is easy in an emergency for some of these aspects to be overlooked. Because of their potential impact on security, the manager should therefore take particular care to ensure that they are thoroughly planned and implemented. Relevant financial procedures should normally be made available to all international staff before deployment. A critical requirement is that a properly trained and briefed bookkeeper, accountant XE "Financial security: need for accountant from outset"  or financial manager, appropriate to the size and type of programme, should be present from the start, including during the planning of the operation. Annex 11 gives a basic checklist of financial security procedures, plus reference to further resources. Annex 21 provides a checklist on Next of Kin records. Annex 22 outlines a procedure for informing Next of Kin of an incident. Offices and warehouses Security at an office XE "Offices"  XE "Buildings" , warehouse or other building is made up of a number of factors including: General location Physical security of the building Local infrastructure Arrangements for receiving visitors Identity of the owner Before deciding to use a building, it should be assessed for its security. For a checklist suggesting possible points to bear in mind when assessing or planning the security of a building, see Annex 1. Ensure that correct health and safety procedures are followed, particularly in warehouses. Staff accommodation Nationally-recruited staff may live in XE "Accommodation: location and type"  their own houses, or may move to live close to their work. They and their families may in some cases be attacked at their homes because of their employment. Thieves may think that they are wealthy. Violent groups may consider them a target for political reasons. If a threat of this kind is assessed, the relevant manager should consider what help is appropriate. A simple example would be installing locks and grilles. Or it might mean giving an extra accommodation allowance. In extreme circumstances it might involve paying for the cost of relocating the entire family. When considering accommodation for international staff, in addition to the checklist at Annex 1 it is wise to consider whether the building will be a restful or a stressful place to live. A comfortable home enabling genuine rest is important for staff efficiency, and ultimately will help the people they are trying to serve. Consider whether there is sufficient privacy, particularly if several staff will be living together. While comfort is necessary, it is also important for international staff accommodation to be modest. If local people perceive that humanitarian staff live in XE "Accommodation: location and type"  luxury, paying excessive rents on unnecessarily lavish accommodation, not only will it damage the organisations reputation but it may lead to greater insecurity for its staff, as local opinion turns against them. It is also wrong in principle for humanitarian funds to be used for unnecessary expenses. Standard documents and equipment It can save much time if some standard resources XE "Standard documents"  are available to a team when about to deploy to an emergency. They can also make security management easier. Examples of useful resources include: Standard contracts XE "Standard contracts"  XE "Contracts: standard contracts"  Other standard documents such as administrative procedures Common items of equipment, procured in advance and stockpiled Computer software, XE "Software"  customised to the needs of the organisation Some of the Annexes to this Guide may be helpful for suggestions, when designing standard documents or equipment lists for an organisation. Personal preparation In addition to training, briefing and equipping, staff should remember the following: Understand and respect the cultural and political environment in which you will be working. This may involve reading; being briefed; asking advice from nationals of the country concerned or from others who have lived there. Take all recommended health precautions Check that you have the recommended security-related equipment and are trained in how to use it Medical preparation Medical preparation is vital XE "Medical: preparation" . Humanitarian staff are often exposed to serious medical hazards, some of them potentially fatal, which can usually be prevented by simple precautions. All staff should normally undergo a medical examination before signing their contract. They should take advice on the recommended vaccination and other medical precautions for the areas that they will be going to, and follow them scrupulously. All staff should be aware of which local medical facilities are recommended, and which should be avoided. This implies that a qualified person should check the quality of local facilities. Basic health XE "Medical: health and hygiene"  and hygiene precautions greatly reduce the chances of illness. All staff should be briefed on these, and managers should check, as appropriate, that staff are taking the precautions. For a checklist of health and hygiene precautions, see Annex 14. Decide how many staff will require first aid XE "First aid: training"  training, and ensure that it is carried out. The organisation should have a policy on first aid see Annex 14. Identify what first XE "First aid: kits"  aid kits, and other medical supplies, will be needed. Medical evacuation (Medevac) procedures are discussed at Annex 20. Check that appropriate medical insurance XE "Insurance"  is in place. Many insurance companies have an arrangement with an emergency medical evacuation company. If your organisation has insurance providing this service, all staff should have the contact phone numbers on their person at all times. A simple way to achieve this is to print an emergency contact card with those and other emergency contact numbers, for staff to keep in their wallet or purse: See Annex 7 for suggested contents of this card. It is good practice for staff to carry in their purse or wallet a record of basic medical data and any special medical requirements they may have, including: Blood group XE "Blood group"  Allergies (e.g. to antibiotics) Any existing disorders Any medication currently being taken Vaccination record (note that some countries require certificates of vaccination as a condition of entry) These details should be given both in an international language and in the local language if appropriate. Security management in the field Revised security assessment Even if a preliminary security assessment XE "Security assessment"  has been carried out, it will need to be updated and if necessary revised when the team deploys to the field. This is because the situation may have changed, or because the arrival of the team may itself have an impact on local perceptions and relationships, and therefore on the security of the team. The security assessment should be further updated and revised whenever the situation demands it. Senior managers should be XE "Managers: senior managers"  informed of any significant change in the assessment, and its implications for the staff and the programme. Revised security plan The security plan produced XE "Security plan"  before deployment (see Chapter 3 above) should be reviewed in the light of experience on deployment, and modified if necessary. Annex 31 gives a suggested format for a security plan. The security plan should be updated and modified whenever required. Where possible, it should be the product of consultation with both national and international staff. This encourages a sense of ownership of the rules and procedures contained in the plan, and increases the willingness of staff to follow it, even when that may be inconvenient. All literate staff should receive a copy of the security plan on their first day at work, as part of their initial security briefing. They should be required to read it immediately, and should receive any help they may need to understand it. It is good practice to require staff to sign a statement within their first 24 hours in the field, that they have received a security briefing, have read and understood the security plan, and agree to follow it. Without such a system, many experienced managers report that new staff sometimes do not receive a security briefing on time, or do not actually read the security plan. This method also sends a signal that security is to be taken seriously, and produces a record for accountability purposes. If staff begin to ignore a security rule or procedure within the plan, it may be because it is unrealistic and needs to be changed, or because they have not understood the reason for it, or because they do not feel sufficiently responsible. Whatever the reason, consulting them will help to identify the right course of action, whether it is to modify the plan or to keep it as it is while explaining the need for it and encouraging staff to take it seriously. Staff should understand that unless and until the plan is modified, failure to follow it is a disciplinary offence. Information-gathering Being well informed is XE "Information: information gathering"  one of the keys to security. This applies at every level: all staff should be aware of what is going on around them. Those responsible for the management of security should be especially well informed. Sources of information and topics of interest are similar to those given for a security assessment at Annex 26. Both national and international staff should gather information and feed it into the team. National staff are likely XE "National staff: information-gathering"  to have many sources of information that are not available to international staff. Regular information-sharing XE "Information: information sharing"  forums normally operate when there is more than one humanitarian organisation in the location: security-related information should be methodically shared and discussed at these. Managers should disseminate security-related information to colleagues on a regular basis. A simple method is to include a short security update in all briefing meetings and in all reporting formats. Staff working in remote locations should also be kept up to date, and should supply the field office with any security-related information they themselves have received. Relations with the local population Relations with the local population, XE "Local population"  and any other local residents such as refugees, are probably the most important of all security measures. A detailed knowledge of them is vital for good humanitarian assistance, and for security. Relationships with leaders of all significant groups, and with ordinary people of all types, greatly increase the ability of organisations to meet humanitarian needs, and to do so in a way that is safe both for local people and for humanitarians. Managers and their staff should normally spend a considerable proportion of their time meeting and talking with a representative variety of local people. There are many ways of doing this. Some of the most commonly used ways are: Regular conversations with nationally-recruited staff Regular meetings with local leaders of all significant groups One-to-one conversations with a balanced selection of leaders Random visits to homes in a variety of geographical areas, if appropriate in the local culture Visiting people living away from major towns, and away from major roads. (There is a tendency for busy humanitarian staff to visit people near easily accessible towns and routes far more than those in areas off the beaten track.) Visits to religious leaders Attendance at social occasions, when invited Visiting areas inaccessible to vehicles, on foot if necessary Discussing and sharing information with other humanitarian organisations Reading local press and listening to local radio and TV The pressures on a humanitarian managers time are such that it is often difficult to visit local people as much as would be ideal. But it is essential that at least a basic minimum of visiting and discussion takes place. If it does not, the risks to programme quality and to security are likely to rise. Nationally-recruited staff are a major source of local knowledge and opinion. Their advice should normally be asked on all significant programme and security decisions, unless to do so might place them or others in unacceptable danger. But the views of nationally-recruited staff are unlikely to be sufficient. They will not be able to represent the wide variety of perspectives held by different groups of local people. It also depends for each staff member on: The access they have to information about security (through friends, family, other contacts) Their ability to analyse this information to identify what may be important for you Their willingness to share this information with you There is therefore no substitute for speaking with local people who have no connection with humanitarian organisations. Relations with other organisations Local authorities Humanitarian agencies normally establish XE "Local authorities"  early contact preferably before deployment with the government or other authorities of the area where they are working. The reasons for this include: Explanation of the organisations role, to ensure that it is understood and not confused with any non-humanitarian organisations Making clear the humanitarian principles on which the organisations work is based Explaining that donor XE "Donors"  interest is also a major factor in determining which programmes are run, and even whether the organisation can continue its presence in the area Increasing the organisations security by winning greater acceptance for its work Obtaining any necessary permissions Establishing a mutually respectful relationship which may be helpful if lobbying is needed in future Obtaining any relevant information on the general situation Local security forces It is often helpful to make contact with the security forces XE "Security forces: local"  XE "Military forces: local"  XE "Local security forces"  XE "Civil-military relations"  in the area (either military or police or both XE "Police: local" ), for the following reasons: To explain the organisations role, thus preventing any damaging misunderstandings To make clear the humanitarian principles on which the organisations work is based To obtain their contact information, in case it becomes necessary to contact them in an emergency To obtain any necessary permissions To establish a mutually respectful relationship which may be helpful if lobbying is needed in future To obtain any relevant information, including on the levels and types of insecurity in the area Humanitarian organisations should ensure that their contacts with the authorities, and especially with security forces, do not compromise their independence either real or perceived. If there is more than one security force, perhaps on different sides of a conflict, the team leader should decide whether to establish contact with all security forces, to show transparency and impartiality, or whether there is a good reason to avoid contact with one or more of them. In cases where the security forces are oppressing the population or are unpopular for other reasons, local people should be given no reason to suspect that a humanitarian organisation is close to, collaborating with or tacitly supporting the security forces. In these cases it is usually wise to avoid frequent meetings, social contact, joint statements or any other activity with security forces which could cause misunderstandings since misunderstandings of this kind could be very dangerous for the humanitarian organisation. Humanitarian organisations are subject to the laws of the country in which they are present. Unless there are overriding reasons to disobey an unjust law, it is important that humanitarian organisations are rigorous in observing the law. This is not only right in principle; it can also help to protect the organisations from trouble including criticism, detention, harassment, attack or expulsion from the country. There may be cases when the government or other authorities are committing crimes of such seriousness that humanitarian organisations decide to denounce them publicly. Public denunciations can have major consequences for the organisation making them, including sometimes severe consequences for the security of their staff. It can have an equally great impact on other similar organisations in the area even those which have decided to stay silent. Any organisation intending to make critical public announcements should think through these potential consequences beforehand, and should wherever possible inform and consult those organisations likely to be affected. Other humanitarian organisations Good relations with other humanitarian organisations in the area can help to enhance security, for at least the following reasons: Information-sharing XE "Information: information sharing" : this is an important aspect of good security management. If possible, a systematic collation of security-related information, including security incidents, should be organised on a collaborative basis by humanitarian organisations. An inter-NGO security office may sometimes be helpful, along the lines of the recent Afghanistan XE "ANSO (Afghanistan NGO Security Office)"  NGO Security Office (ANSO). Discussion of security issues A common position can sometimes be helpful on matters of principle or practice Some organisations may be willing to share assets that are helpful to other organisations for example, a radio network or the advice of a security advisor XE "Security advisor"  Some organisations may have access to influential figures, including authorities, which could be used for the benefit of all humanitarian organisations General humanitarian coordination meetings often include XE "Security coordination"  XE "Coordination on security"  a discussion on major security issues. In some cases NGOs organise their own regular meetings to discuss security issues. Participation in such meetings is to be encouraged, for the reasons listed above. The meetings need to be frequent enough to be effective, yet not so frequent as to overload busy managers. They need to be skilfully chaired to ensure that discussions are efficient. While good relationships with other organisations can be very helpful, it should remain clear that each organisation is responsible for its own security. Any lack of clarity about where this responsibility lies can be dangerous. The UN security system In many humanitarian emergencies the United Nations plays XE "United Nations: security system"  a pivotal role in security management. Its resources and status often enable it to make available a security officer, a dedicated security radio channel, information, or other resources for the use of the whole humanitarian community. Many NGOs cooperate with the UN on security matters, exchanging information and informing each other of security plans. It is therefore helpful for all humanitarian organisations to be aware of the UN security system. It is described at Annex 40. International military forces In cases where a properly XE "Security forces: international"  XE "Military forces: international"  XE "International military forces"  XE "Civil-military relations"  mandated international military force is present on the ground, it will usually be necessary for humanitarian organisations to have a means of dialogue with the force. At the simplest level, this may be only for information exchange, allowing the two sides to explain their role and activities. For the humanitarian agencies, such contact is often a useful source of information on the security situation. Humanitarian organisations should take care that their contacts with any military force are not perceived as compromising their independence and impartiality. In most cases this will probably mean that contacts with any military body should have a low profile. Humanitarian organisations will wish to keep a distance from a military force, in order to maintain and demonstrate their independent humanitarian mission. Beware of giving or receiving information that is more than general in nature: the distinction between information and military intelligence can be a fine one, and it is important that there is no suspicion that you are involved in military intelligence. If an international military force is or has been a belligerent in the conflict, or is perceived as such, the need for distance is still greater. However, some level of contact with or representation to them is likely to be desirable, to explain your position and, where necessary and appropriate, to remind them of their duties under international law. Some humanitarian organisations believe that military forces should never provide any humanitarian assistance, or support to humanitarian organisations, on the grounds that this compromises humanitarian independence and confuses the military and humanitarian roles in the minds of the local population. Others believe that, in cases where humanitarian organisations are overwhelmed by serious need, it may be right for the military to support the humanitarian effort in order to save life and prevent suffering. The majority view is that military forces should only help with a humanitarian effort in urgent, life-saving situations where humanitarian organisations are not able to meet the needs. Serious problems can sometimes arise because of a lack of understanding between military and humanitarian bodies. Humanitarian organisations which refuse any contact with the military may deprive themselves of important security information, and run into dangers that they could otherwise have avoided. The military may also see them as biased. Military personnel who act without regard for humanitarian organisations may endanger them, for example by wearing civilian clothes while carrying weapons, and calling themselves humanitarian when meeting local people thus causing confusion between military and humanitarian personnel and provoking attacks on the latter. For all the above reasons, each organisation should give guidance on dealing with the military, in its security policy. See Annex 32 for a suggested format for a security policy. If the military do provide support to the humanitarian effort, it should be: Defined in advance Clearly in support of humanitarian organisations Ideally provided at the request of the humanitarian organisations This will help to reduce the risk of compromise and confusion, but will probably not eliminate it. Whether humanitarian organisations request assistance from the military will depend on the circumstances, the level of and type of needs, and their capacities to meet that need. Local peoples perceptions of the international military force will be an important factor, bearing in mind that those perceptions might change rapidly in future, if for example the military is required to take action which is unpopular. International military forces have assisted humanitarian programmes in a number of crises, for example with: Rapid construction of refugee camps and associated facilities Protection of convoys Providing area security Responding to emergency security needs Logistics and transport assistance Mine clearance Immediate life-saving assistance during overwhelming crises, if humanitarian organisations do not have the capacity to meet the need The UN has a procedure for deciding whether to make use of military assets in XE "Military assets"  support of a humanitarian organisation. Among other criteria, using military assets should be: The option of last resort, indispensable and appropriate Not used if the offering military force is a belligerent in the conflict Limited in time and scale Not direct assistance to the population, if possible Assessed for its likely impact on the security of humanitarian personnel Assessed for its likely consequences for beneficiaries, other humanitarian actors, and humanitarian operations in the medium to long term Under military control, but the operation as a whole must remain under the overall authority and control of the responsible humanitarian organisation For the full procedure and criteria, see the relevant UN document. International police force An internationally-mandated XE "Police: international"  XE "International police"  police force may in some cases have an executive policing role, providing police services directly to the public. Often it has no executive role, but may have for example a supervisory, monitoring, advisory or training role. If the international police force has an executive role, humanitarian organisations will normally wish to make themselves known to the force, in case they need to call on them during an emergency. They should inform them of the locations of all offices and houses, so that if they need to call for urgent help, the police can find them quickly. A common problem is for humanitarian locations, as recorded by the police, to become out of date as organisations move offices and rent new houses, forgetting to inform the police of the changes. A named staff member should therefore be made responsible for keeping the police, and any other relevant bodies, updated on current locations. If the international police force does not have an executive role, there may be little need for humanitarian organisations to be in contact with them unless the local police fail in their duty. Embassies Staff of humanitarian organisations are advised XE "Embassies"  to register their presence with their home countrys local embassy. This is particularly helpful if embassies might have a role in providing consular protection services for their nationals, or in arranging evacuation if the security situation demands it. Embassies sometimes act as assembly points prior to an evacuation of their nationals. If so, assess it to ensure that it is an appropriate location: sometimes they are targets or the scene of rioting. Newly arriving staff should routinely be reminded by their manager to register with their embassy. In some cases contact with embassies may need to be low profile, especially if the embassy represents a country which has a partisan agenda in the area, or is perceived to have one. Donors In general, donors do not provide direct security assistance other than funding for security measures. Direct contact between a field operation and a donor XE "Donors"  on security issues is therefore unlikely to be necessary while the operation is ongoing. Donors requirements on visibility and its security implications are covered in the section Visibility and security below. Local partners Many humanitarian organisations have partnerships with local bodies such as local NGOs XE "Local partners"  XE "Local NGOs" , religious groups or community associations. Those organisations are usually responsible for their own security, since they remain independent while engaged in a partnership arrangement. When negotiating the partnership agreement, both parties should consider what security implications there may be, if any. It may be that one or both sides will encounter greater or new types of insecurity as a result of entering into the agreement. The parties should agree any security measures at this stage, including any necessary training, briefing, equipping and funding. These security measures may delay the start of partnership activities, leading to a temptation to cut corners. While emergency programmes should be launched as rapidly as possible, this should not be at the price of unacceptably high risk to life and property. This is a matter for managers judgement in each case. It will often not be necessary for local organisations to have the same security rules and procedures as international organisations. Different security measures are usually appropriate, since they belong to the culture, have great local knowledge, language and experience, and are well connected locally. In some cases, however, similar security measures may be required. If so, they should not be overlooked. Security coordination between humanitarian organisations Coordination with other humanitarian XE "Security coordination"  XE "Coordination on security"  organisations is an important part of good security management. The actions of one can have an impact on the security of the others. Local people often draw little distinction between one humanitarian organisation and the next. All humanitarian staff should therefore strive for good coordination, so far as the situation and the mandate of their organisation allow. Coordination on security can promote the following effects: Sharing information Agreeing common policy and practice, particularly on issues such as Interfacing with military and belligerents Use of armed guards Use of private security XE "Private security companies"  companies Salary and fee levels for services Sharing security training XE "Training: sharing training"  (two or more organisations can pool resources to carry out training, or the security officer of one organisation can train inter-agency groups) Learning from each others experience and good practice Understanding the local situation better, resulting in fewer security-related errors Solidarity between humanitarian organisations, which can have further beneficial effects on the effectiveness of programmes Any organisation with particular weaknesses can receive friendly advice or warnings from stronger organisations Any organisation with particular strengths can have a positive influence on the whole humanitarian community in the area Coordination on security often takes one or more of the following forms: Information-sharing XE "Information: information sharing"  meetings Liaison with a nominated security officer or security advisor (often XE "Security advisor"  the UN security officer) An NGO security organisation. A recent example is ANSO, the Afghanistan XE "ANSO (Afghanistan NGO Security Office)"  NGO Security Organisation, which provides training, information, analysis, practical advice and coordination to the NGO community in Afghanistan. The model is being adapted for use in other countries. A dedicated security radio channel Regular radio checks for all humanitarian personnel Coordinated contingency plans XE "Contingency plans"  Coordinated evacuation Joint lobbying of local authorities or XE "Local authorities"  other leaders Collocation of offices or accommodation Sharing of the costs of coordinated security measures, for example patrols by a private security company or the local police XE "Police: local"  Even though they coordinate, each humanitarian organisation remains autonomous, responsible for all of its security decisions. These will sometimes differ between organisations. It may be that some organisations decide to evacuate, for example, while others decide to remain. If possible, important security decisions should be taken after frank discussion between the organisations, to ensure that all are basing their decision on the fullest possible information. The Field-Headquarters relationship It is vital that the security-related responsibilities of HQ and field managers XE "Field-Headquarters relationship"  are clearly defined. The security policy should set out the responsibilities of each, and the limits of those responsibilities. Security management should normally be delegated to the field manager, since he or she will have the best knowledge of the situation and will therefore be best placed to make good, timely decisions. A relationship of confidence between HQ and the field will promote good security management. The field should keep HQ well informed of the situation. The HQ should support the field manager, providing good quality staff and other resources needed to manage security well. HQ managers should visit the field often enough to appreciate the situation, without burdening field staff unduly. HQ managers should trust the field manager to make good decisions on security. In most cases the decision of a competent manager on the ground is likely to be better than a decision coming from a distant HQ. The field manager has more detailed and more current information, and can assess a number of intangible factors that may be impossible to report to HQ. As a general rule, HQ should aim not to overrule field managers on security issues, especially decisions to evacuate. On the other hand, field managers can and sometimes do make mistakes. An alert manager at HQ should aim to discern when a mistake has been made, and should overrule if failure to do so is likely to threaten the safety of staff, local people or property. HQ managers will be more able to make these judgements, and will have more credibility in the eyes of their staff, if they themselves have had significant field experience during emergencies. Reporting Good reporting XE "Reporting"  enables managers to make informed decisions, including decisions about security. It also helps accountability, by providing a record of what information is available and what decisions are made. This can protect both staff and managers in the event of an investigation. The following types of report are commonly used: Situation reports (usually known as sitreps XE "Sitreps" ) Incident reports Regular sitreps provide managers and other colleagues with important information that they need to do their job. The frequency of sitreps is for organisations to decide and will depend on the situation: daily sitreps may be needed at the start of a crisis, reducing to weekly, fortnightly or even monthly sitreps once the situation has stabilised. When circumstances demand it, a special sitrep is sent, to update managers or colleagues at a moment when no regular sitrep is due. Sitreps should provide a concise, accurate snapshot of the current situation. Each significant aspect should be described. Often a single summary sentence can encapsulate the current status of one particular aspect of the situation. Each organisation will have a different view on the length and detail of sitreps, although in general short sitreps are preferred during emergencies. Longer sitreps are sometimes not read by busy staff. It is helpful if sitreps have a standard format. This saves time and ensures that all topics which the organisation thinks vital are covered. It also allows flexibility, since additional topics may be added by the sitrep writer. A suggested format for a sitrep is at Annex 34. For a suggested format for incident reports, see Annex 29. Especially during a conflict, careful judgement is necessary to decide what information about the conflict should be included in reports. In general it is best not to include information which could be misunderstood by the authorities, could endanger staff or local people, or could result in accusations of spying or other offences. If it is vital to pass on such information, it is better done face to face, with no written record held in the country concerned. Report writing is an important skill. Managers should ensure that this skill is nurtured among staff who have to write reports. Training in report writing should be provided when necessary. Security aspects of programme design When designing programmes or projects, consider the security XE "Programme design security aspects"  aspects. These may include: How will the project or programme be designed? Will local people and/or respected leaders be involved in the design? (The Code of Conduct XE "Code of Conduct"  says that beneficiaries should be involved in the management of relief aid.) How will people be informed of the project or programme? Will local people have a means of making comments or complaints during implementation? How will these be handled? Might any groups of people misunderstand the plans, and gain false expectations of receiving aid? How could these expectations be managed? Might your plans undermine or strengthen someones power base? Who will gain and who will lose out, as a result of your plans? Might any groups oppose the plans? Will your plans be seen as fair and impartial? What possibilities will there be for fraud or diversion of aid? How could these be guarded against? How could false allegations, or the perception of fraud, be averted? Will any goods or cash need XE "Cash"  to be secured? Will any goods or cash need XE "Cash"  to be transported securely? Will particular goods or assets required for the programme pose a valuable target for thieves XE "Crime" , criminals or parties to a conflict? What types of evaluation or audit XE "Evaluation"  will be needed? Might the project or programme affect the security of beneficiaries, or other local people, or your organisation, or other organisations? How will other organisations be informed of the plans? Will they have a chance to comment or advise on the plans before they are finalised, and in time for plans to be changed if necessary? (They may point out security or other issues which you are not aware of.) Will the plans need to be coordinated with other organisations plans, from a programme or security point of view? Routine security management Teamwork Every member of the team should XE "Teamwork"  feel a responsibility for security. All appropriate staff should be involved in contributing to good security procedures. Discipline and XE "Discipline"  mutual support are needed. Managers should build up team spirit, and demonstrate that they care for its safety. Since the security situation evolves over time, and since staff come and go, security updates should be included regularly in staff meetings. Managers should consult the team when they reassess the security situation and when considering any changes to procedures. It may be helpful to delegate some specific security-related functions to one or more team members, while retaining overall oversight and responsibility. Depending on the circumstances it is often wise to practise some security procedures as a team. Examples could include: Reaction to armed robbery attempt Passing through a checkpoint Sending an incident report First aid procedures XE "First aid"  Procedures for entering and leaving a house by car Fire drills Staff behaviour The behaviour of humanitarian XE "Staff: staff behaviour"  XE "Behaviour of staff"  staff, both on and off duty, gives important signals to local people. If staff are consistently considerate, modest and interested in local people, that will promote the organisations acceptance among those people. If staff appear arrogant, rude, immoral by local standards, or express sympathy with one party to the conflict, the organisations acceptance will diminish and so will its level of security. Annex 5 demonstrates the importance of cultural awareness. Managers should explain these issues to staff as often as necessary, monitor staff behaviour and correct it when required. Other points for staff to bear in mind include: Be friendly, respectful and tactful when meeting people. Get to know the culturally acceptable styles of greeting and conversation. Learn as much as you can of the language. Even a few words of greeting in the local language can make a big difference. Dress appropriately XE "Dress" , bearing in mind the local culture Build good relationships with local people, making sure that you show no bias towards one group or another. Get involved in community activities outside work. Respect security procedures in a methodical and XE "Discipline"  disciplined manner. Use initiative and common sense if the situation demands it. Be aware of your surroundings and stay alert. Be suspicious of anything out of the ordinary Check that you have and carry the recommended security-related equipment Keep communications equipment well XE "Telecommunications"  maintained and within reach Vary the routes that you take to and from work, and the timing of your journey Depending on the local situation, it is often good practice to lock the outside doors to your accommodation as XE "Accommodation: locking doors"  darkness falls Beware of common criminal tactics XE "Crime" : Keep your belongings with you and in view at all times A fool and his luggage are soon parted Carry bags in a secure manner Do not accept sweets or food from strangers in case it is drugged Beware of jostling in a crowd, or being distracted by one person while his accomplice tries to pick your pocket Do not accept lifts from strangers Avoid walking at night, or near bushes, dark doorways and other places of concealment. Keep to well-used roads If asked for directions by the driver of a vehicle, do not approach the vehicle. A common criminal XE "Crime"  technique in some contexts is to ask a potential victim to come closer to look at a map. If you think you are being followed, cross the road. If the person follows you, cross it again. If you are still worried, go at once to a place where there are lots of people, and tell someone what is going on. Consider carrying a torch or whistle, or better still a very loud alarm XE "Alarms"  Use an outside light when answering the door at night to illuminate your visitor XE "Visitors: access" . Do not turn on the interior light. In a hotel XE "Hotels security precautions" , consider staying on an upper floor if ground floor windows are accessible from the outside. Keep balcony doors and windows locked. Do not leave your key where someone can note your room number. Lock your hotel room door even when you are inside the room. Use the chain on the door if you are not expecting a visitor. Avoid inappropriate sexual behaviour (e.g. use of prostitutes; sexual activity with those under the age of 18; sexual relationships with beneficiaries; other behaviour which is contrary to local customs) Be aware that drugs added XE "Drugs"  to drink are sometimes used by criminals, who intend to commit theft XE "Theft" , rape or other crimes. When at a bar, club or party, never leave your drink unattended, even when going to the toilet. If appropriate, nominate a friend to watch the drinks. Never accept a drink from someone you do not completely trust. If you begin to feel really drunk after only a drink or two, seek help from a trusted friend, who should get you to a place of safety as soon as possible. Remember that non-alcoholic drinks such as tea or coffee can also be targeted. Follow the Red Cross/Red Crescent/NGOs Code of Conduct XE "Code of Conduct"  Respect local laws Dont request or accept personal favours of any kind from contractors Dont misuse the resources of your organisation Take all recommended health precautions Keep fit and healthy Take proper rest and eat properly Do not use illegal drugs XE "Drugs"  Drink alcohol, if it is legal, only in moderation Female staff In many situations XE "Staff: female staff" , women can be XE "Female staff"  at risk from different or greater threats XE "Threat: threats to female staff"  than men. The following personal security advice is likely to be applicable to all staff, but may be especially helpful to women. You should use your judgement as to which of them are applicable in your situation. Some suggestions follow: Know where you are going, and look as though you know where you are going. If you look confident (even if dont feel confident), you are less likely to appear vulnerable to attack. In public, dress and behave XE "Dress"  in an unobtrusive manner, bearing in mind local culture and gender roles. This does not necessarily mean international staff adopting local patterns of dress and behaviour, but acting in a manner that is seen by local culture as acceptable for expatriates, taking into account the expatriates culture and the needs of their work. It can be a difficult balance to strike. If meeting someone you dont know well, inform a colleague of your plan. Consider meeting him/her in a public place where there will be other people. When meeting people, if there is any risk of misunderstanding about your intentions, speak up and communicate your wishes clearly Listen to your instincts. If you are unsure about a location or a person, leave immediately. Do not use taxis unless the taxi driver and/or the taxi company is known and trusted. Agree the fare before beginning the trip. In many situations XE "Staff: female staff"  it may not be advisable to walk alone, or drive alone, particularly at night Rest and Recreation (R&R) During a high-pressure operation XE "Rest and Recreation (R&R)" , staff are likely to need regular Rest and Recreation (R&R). Its purpose is to help prevent stress XE "Stress"  or illness, and to improve efficiency. R&R usually involves a staff member leaving the operation for a number of days, going to a location that is near enough to be inexpensive, but far enough from the operation to allow a sense of distance and freedom from pressure. See Annex 25 for further discussion of R&R. Stress Staff should be aware of the dangers of excessive or prolonged stress XE "Stress" , and watch for signs of it in their colleagues. People suffering from stress are likely to manage their security less well, increasing the risks for themselves and their colleagues. Managers should aim to prevent excessive stress, and to spot early on when a colleague is suffering from it. Be aware of the need to monitor your own stress levels and be prepared to acknowledge and do something about excessive stress. This is not only important for you but also your colleagues who may be relying upon you to perform well. Different types of staff may show different signs of stress, because of cultural or personality differences. Their families may also be affected. Managers should set up work and living arrangements in such a way as to minimise stress and its effects. See Annex 35 for more details on prevention, diagnosis, treatment and management of stress. Discipline At times it XE "Discipline"  may be necessary to take disciplinary action against a staff member on security grounds. If a staff member causes a serious breach of security, or persists in insecure behaviour after being warned, formal disciplinary action is likely to be the most effective way to correct the behaviour and protect the team. Managers should not hesitate to take disciplinary action, up to and including dismissal, if the situation requires it. Checkpoints Checkpoints are widely XE "Checkpoints"  used in many countries. Many checkpoints have a legitimate purpose, for example to prevent weapons from entering an area. Some checkpoints have little purpose other than to harass. Some checkpoints are used for example by bandits or undisciplined soldiers as a cover for ambush XE "Ambush" , theft or violence. Staff should be trained and briefed on how to handle themselves at checkpoints. The best approach may vary from situation to situation. See Annex 2 for suggested checkpoint procedures. Weapons Humanitarian staff should not carry weapons XE "Weapons" . Carrying a weapon is likely to damage the organisations credibility as a neutral and humanitarian body. It may also increase the risk of violence, since someone with a weapon can be seen by armed groups or individuals as a threat, and since a weapon may be taken from you and used against you. Remember that a cosh, machete or stick is a weapon. Humanitarian staff should never handle a weapon, even if simply offered the chance to hold one for a few seconds. All kinds of firearms, guns, mines, grenades etc can fire or explode if not correctly handled by a trained person. Some may be booby trapped. A photograph of an aid worker holding a weapon could be used to damage your standing in the local community. Aid workers have been known in the past to keep a firearm under the bed just in case without having consciously thought through the implications for themselves and their colleagues. If this may be a temptation for some staff, the field manager should consider explaining to the team the risks of possessing a weapon. Technical issues Telecommunications Communications equipment does XE "Telecommunications"  not provide security. It is an aid to security, if properly used. The leader of a field team should ensure that the teams communications requirements are thought through in good time to allow the despatch of any vital equipment with the team as it deploys. It is good practice, in insecure situations, for staff to have two independent means of communication (e.g. radio and satellite phone XE "Satellite phones" ), so that if one breaks down communication will still be possible. In particular, avoid dependency on mobile phones. In a crisis a cellular telephone system is particularly vulnerable to becoming overloaded, damaged, or simply switched off by a belligerent. Useful equipment may include: Hand-held radios Vehicle radios Base station radios Repeater stations (it may be possible to share repeater stations with other organisations) Satellite telephones Fax machines E-mail accounts and accessories including software XE "Software"  Landline telephones Cellular (mobile) telephones Any necessary accessories, including battery chargers From a security point of view, key questions requiring decision include: Who needs to be able to contact whom, and with what degree of reliability? Is it necessary to employ one or more dedicated radio operators, to ensure that someone is listening to the radio base station at all times, or during certain hours? Who will be on call at all times in case of emergency? Is a duty officer system required XE "Duty officer" , both at HQ and in the field, where several staff members rotate as the on call person? Or should the manager (or a delegated colleague in the managers absence) always be the on call person? Do you need communications that will give an instant response? Do you need one person to be able to talk to several others at once (radio) or is one to one contact enough (phones)? What communications do other humanitarians in the area use, and do you need to be in contact with them? Is the use of certain kinds of communication equipment perceived as suspicious or a threat by any group? If so, how can you reduce or remove this suspicion? Answers to the above questions will depend on the assessed threat. In most situations, it is not thought necessary or cost-effective to have all members of staff in constant contact, using mobiles phones or radios, though if this is necessary then it should be provided. The manager should decide on the basis of the likely threat to each staff member, regardless of whether they are national or international staff. In many countries there is a legal requirement to obtain a licence to use radios that are capable of transmitting. Check the local regulations and abide by them. Some countries forbid NGOs to operate radios or satellite telephones. Technical assistance will be needed to set up and programme radios. Check whether such assistance is available locally. If so, consider whether it would be safe to rely on local technicians, who may become suddenly unavailable in a crisis. It is also important to be confident that they can be trusted with the knowledge of your communications arrangements: for example, could local military groups pressurise them into revealing sensitive information XE "Sensitive information"  about your organisation? Communications equipment is valuable and portable, attractive to thieves. This should be borne in mind when deciding where to locate communications equipment. Normally staff should sign for receipt of their communications equipment, and be held responsible for its safekeeping. Staff should be trained to use all types of communications equipment that they may need to use. Remember that in a crisis the staff who are most skilled in using the equipment may not be available. Annex 24 gives an introduction to basic radio use, and sources of further help. No communications system is fully secure. All staff should be aware of the need for information security, and the risks that can arise from interception of communications. See Annex 15 for a discussion of information security. Vehicles In most situations vehicles XE "Vehicles"  are an important aid to security. Vehicle management is therefore important, and should include: Maintenance Adequate fuel stocks Keeping all vehicle tanks at least half full Motor insurance XE "Insurance"  Recruiting, briefing and managing good drivers Enforcing safe and considerate driving habits Enforcing the wearing of seatbelts Daily vehicle checks Vehicle log books Awareness of local driving rules and customs Always park facing outwards, to enable a quick departure A policy on carrying hitch hikers or other passengers A policy on whether XE "Weapons"  military personnel, and/or weapons, may be carried Training on vehicle-related security procedures including checkpoints, ambush, action in the event of an accident, under-vehicle search for bombs (in some contexts), etc If possible, vehicles should be of a type and colour that cannot be confused with military, police or government vehicles. They should be clearly identified as belonging to a humanitarian organisation unless, in a specific context, it is assessed as safer for a vehicle to blend in with other vehicles and appear to be a normal civilian vehicle. A list of possible vehicle equipment is at Annex 42. Armoured XE "Vehicles: armoured vehicles"  vehicles are used by some humanitarian organisations, in extreme cases. They are expensive, heavy and require special training to drive. Most civilian armoured vehicles provide protection against only a limited range of threats. In most cases such vehicles are not necessary, and if they are necessary it may be best not to work in that area at all. Seek experienced advice before deciding to procure them. Guards Guards are often XE "Guards"  needed at accommodation XE "Accommodation: guards" , offices and warehouses. Guards need careful briefing, equipping and strict management. Their instructions should be clear. Procedures should be in place for when a guard falls ill, or does not appear for duty, to ensure that buildings are never left unguarded. Annex 13 contains points to bear in mind when managing guards. In some situations it can be appropriate to use private security companies XE "Private security companies" . They may reduce the administrative and management burden and ensure continuity of cover. But there may be disadvantages or even dangers in using them. See Annex 13 for a discussion of the advantages and disadvantages of using private security companies. In exceptional cases, armed guards may be necessary and appropriate, if there is no other way to protect life and property adequately. Annex 13 contains some points to bear in mind when considering the use of armed guards. Fire safety Although fire safety XE "Fire safety"  is usually seen as a health and safety rather than a security issue, it would make no sense to manage security well without taking sensible fire precautions. All buildings should be checked for fire safety, including ensuring that staff can exit easily. Simple fire safety measures such as smoke detectors and fire extinguishers save lives. See Annex 12 for suggested fire safety procedures. Administrative issues Financial security During a fast-moving XE "Financial security"  emergency it is particularly easy for good financial procedures to be overlooked. This has often led to fraud, theft XE "Theft"  or mismanagement involving large sums of money. These problems can be greatly reduced by insisting on sound financial procedures from the start. The procedures should be simple, and designed so as not to impose delay on emergency programmes. If they do cause delay, field staff are more likely to ignore them. A critical requirement is to ensure that a properly trained and briefed bookkeeper, accountant XE "Financial security: need for accountant from outset"  or financial manager, appropriate to the size and type of programme, is present from the start, including during the planning of the operation. See Annex 11 for further information on financial security procedures. Information security Humanitarian organisations need to store XE "Information: information security"  and transmit sensitive information XE "Sensitive information" . Examples may include: Financial records XE "Financial security: accounting records"  Requests for money transfers Information on persecuted individuals or groups Records of human rights abuses or war crimes XE "War crimes: records"  Plans concerning staff movement through insecure areas Assessments of the political or security situation Personnel files Sensitive information XE "Sensitive information"  should only be stored or transmitted if it is necessary to do so, in line with the organisations mandate and programme. Holding or sending unnecessary sensitive information can place the organisation at greater risk. There have been cases of humanitarian staff being imprisoned for long periods because they were found with information on military movements or other subjects deemed to be incompatible with a humanitarian mandate. Transmitting sensitive information XE "Sensitive information"  brings added risks of it falling into the wrong hands. In many humanitarian crises, it would be surprising if all communications were not monitored by the authorities. Some organisations consider that the risks are so great that the team leader must authorise each communication before it is sent. Others rely on good training and briefing. Whichever procedure is adopted, all staff should understand that no communication system is totally secure, and be disciplined in following procedures. The most sensitive messages may in some cases have to be communicated face to face, and not entrusted to e-mail, fax, phone, radio or letter. Normally, staff should be aware of sensitive information XE "Sensitive information"  only on a need to know basis, meaning that a given piece of information is only shared with those staff who need to know it. In this way, other staff are protected, and the risk of information loss is reduced. Files or computers holding sensitive information XE "Sensitive information"  should be kept in rooms where visitors do XE "Visitors: access"  not have access. Passwords should protect all computers. When travelling, staff should be briefed to keep any computers with them at all times, and not entrust them to others. All staff should be made aware that deleting files from a computer does not necessarily remove them from the hard disk. A clear procedure for storing and transmitting sensitive information XE "Sensitive information"  should be given to all relevant staff. See Annex 15 for a suggested checklist on information security procedures. Managing keys Good locks are XE "Locks"  XE "Keys"  not effective unless keys are managed properly. All keys should be accounted for, with staff signing for receipt of each key. If a key is lost, locks should be changed. Identity badges It is good practice to provide photo identification XE "Identity badges"  cards for all staff, and emergency contact cards XE "Emergency contact card"  for visitors XE "Visitors: emergency contact card" . They can be laminated, two-sided cards with the applicable international language on one side and an appropriate local language on the reverse. They should clearly show an expiry date: this prevents former staff from continuing to use the badge, and limits the damage if a badge is lost or stolen. Procurement The way in which XE "Procurement"  humanitarian organisations procure goods and services can have security implications. Many serious attacks, including murders of NGO staff, have been related to procurement issues. Unless procurement is carried out fairly, and is perceived as fair, some local traders and others are likely to feel aggrieved. In some contexts, fair may be interpreted as buying from local traders, even if their prices are higher. Depending on the situation, these grievances can be expressed in a variety of ways including threats to the safety of staff. They can also lead to costly and time-consuming legal action. Great care should therefore be taken to ensure that procurement procedures are good, and followed. Retaining a good local lawyer can help in preventing problems and in defending against malicious or other claims. Corruption The security of humanitarian organisations can be threatened by corruption XE "Corruption"  XE "Bribes" . For example, paying a bribe can lead to a threat XE "Threat: bribes and threats"  if a similar bribe is withheld in future. Yet if civil servants are receiving no salaries, reasonable fees for their services may be seen as legitimate income. Humanitarian organisations should have no involvement with corruption. They should take the local situation into account when deciding preferably in a coordinated manner with a whole humanitarian community whether certain fees are justified in a civil service or a commercial context. All staff should be aware of the importance of avoiding corruption. Staff found to be involved in corruption should be disciplined. All relevant staff should be aware of practical ways of avoiding corrupt practices. Annex 4 contains some tips on how to avoid some common examples of corruption. Consider a Get-you-in team Because of the heavy XE "Get-you-in team"  administration and management load when a team deploys, it can be helpful to deploy at the same time a get-you-in team whose task is to assist the field team in setting up the financial, administration, logistic and other systems necessary for an efficient field operation. A finance/administration specialist at this early stage is often particularly vital. The get-you-in team may only be on the ground for, say, one to four weeks, and would depart as soon as the field team can manage without them. Travel In many contexts XE "Travel" , the majority of security incidents occur during travel. Some of the threats associated with travel are: Accidents Ambush Robbery Aggressive behaviour of armed personnel at checkpoints In insecure locations, all staff should be met on first arrival, and on subsequent arrivals if necessary. Those meeting staff should carry identification. All relevant staff should be briefed, trained and equipped so that the risks from travel are minimised. A procedure for authorising travel should ensure that each journey is for a good reason, and that staff prepare properly. See Annex 39 for a suggested format for travel authorisation. All vehicles used, including aircraft or boats, should be in good condition and operated by qualified personnel. All drivers should be required to carry out daily checks on their vehicles and should be tested in changing a wheel and other commonly-required tasks. See Annex 6 for a suggested checklist for drivers and Annex 42 for a suggested equipment list for vehicles. Vehicle doors (including luggage or cargo doors) should be locked while driving. Leave space between you and the car in front, particularly at traffic lights or when the car in front has stopped. This gives you some freedom to manoeuvre. Vary the time and route of any regular journeys you make, for example to and from the office. If criminals can predict where you will be and when, it is easier for them to target you. In some circumstances it may be necessary to travel in convoy. See Annex 3 for suggested convoy procedures. Vehicle accidents are XE "Accidents"  a leading cause of injury and death to humanitarian staff. All managers and staff must insist on defensive, safe and considerate driving. Disciplinary action should be taken against drivers who persist in driving badly or whose driving may bring the organisation into disrepute. Staff expected to drive 4x4 vehicles should be trained to drive them properly. If permissions for travel are required from local authorities, leaders or groups, great care must be taken to ensure that those permissions are obtained, and the relevant documents carried by those travelling. In particular, clearance for flights, crossings of lines of conflict, and through insecure areas should be rigorously checked by a responsible manager before travelling. Humanitarian staff have in some cases been attacked simply because permissions had not been obtained, or there was a misunderstanding, or local officials or military had not been made aware of the intended journey. Media aspects of security management Use of the media can have security implications for humanitarian organisations. On the one hand, the local media can be helpful in informing local people of current and planned activities, and in winning local acceptance. On the other hand, the media can sometimes XE "Media"  raise the profile of a humanitarian organisation to a level where it becomes a greater target for criminals or for violent groups. In general it is likely to be better to give media interviews than to refuse them. But remember the journalists mantra: No news is bad news, good news is bad news bad news is good news. There may be some circumstances where any use of the media may present a danger to humanitarian organisations or to local people for example where media coverage of aid to a particular group may exacerbate ill-feeling towards that group or their helpers. It is often necessary to manage local expectations. Local people may assume that newly-arrived humanitarian organisations will provide large quantities of aid to the whole population. Early explanation of the plans, including through local media, will help to ensure that expectations are more in line with reality. If this is not done, there will often be a high risk of disappointment, leading in some cases to increased security risks. When giving media interviews, the most appropriate staff member should be used. Often the manager will be the most appropriate. A nationally-recruited staff member (not necessarily the manager) may sometimes be able to give a more accurate and culturally appropriate message, enhancing local acceptance of the organisation, and therefore its security. For tips on the security aspects of handling the media, see Annex 19. Visibility and security The visibility XE "Visibility"  requirements of donors may sometimes have security implications. Where the display of donor XE "Donors"  logos may result in danger to humanitarian staff or local people, visibility requirements should normally be waived. For ECHO, the following extracts from its Framework Partnership XE "Framework Partnership Agreement (ECHO)"  Agreement General Conditions are relevant: Article 6.1 states: The Humanitarian Organisation shall contribute to the visibility of the humanitarian Operations financed by the European Community, provided that this does not harm the Organisations mandate or the safety of its staff. Article 6.3 states: In cases where equipment or vehicles and major supplies have been purchased using funds provided by the Commission and provided that this does not harm the Organisations mandate or the safety of its staff, the Humanitarian Organisation shall include appropriate acknowledgement on such vehicles, equipment and major supplies, including display of the European logo (twelve yellow stars on a blue background). Article 6.6 states: The Humanitarian Organisation authorises the Commission to publish the following information in any form and medium, including via the Internet: The Humanitarian Organisations name and official address The purpose of the grant agreement The amount granted and the proportion of the Operations total cost covered by the funding Upon a duly substantiated request by the Humanitarian Organisation, the European Commission may agree to forgo such publicity if disclosure of the above information would risk threatening the Organisations safety or harming its interests. Annex V (procedures for the award of contracts) makes certain visibility requirements, but also contains article 3.8 which states: Upon a duly substantiated request by the humanitarian organisation, the European Commission may agree to forego such publicity if disclosure of the above information would endanger the organisations safety or harm its interests. ECHO partner XE "Partners"  organisations should be aware of these provisions and make use of them where appropriate. Other donors are likely to have equivalent rules: humanitarian organisations funded by other donors should be aware of and make use of these rules when necessary. Legal protection of aid workers The host government has primary XE "Legal protection of aid workers"  responsibility for the security and protection of: Humanitarian staff Their dependants and property The property of humanitarian organisations This responsibility flows from every governments duty to maintain order and protect people and property within its jurisdiction. In the case of international organisations and their officials and property, the government is considered to have a special responsibility under the Charter of the United Nations or the governments agreements with individual organisations. The Geneva Conventions provide further legal protection to certain carefully-defined categories of civilian medical and relief personnel, but this does not cover humanitarian staff in general. Staff of the ICRC XE "International Committee of the Red Cross (ICRC)"  are granted protection under the Geneva Conventions, as is the emblem of the ICRC. The 1994 Convention on the Safety of UN and Associated Personnel provides protection to UN staff, and persons deployed by certain organisations with close contractual links to the UN or its agencies. Reporting of war crimes Humanitarian organisations should have a policy on the reporting of war XE "War crimes: reporting"  crimes and/or serious human rights abuses XE "Human rights abuses"  that its staff may witness or find evidence of. Staff should be briefed accordingly. The policy should take into account the threats that XE "Threat"  can face those who report war crimes, as those responsible for the crimes may seek to intimidate witnesses. There may be a need to balance the duty to report crimes with the risk of losing access to beneficiaries, and the risk of violence against staff. It may be possible to report indirectly or discreetly, and in such a way that it will not be deduced that your organisation did the reporting. Security incidents Security incidents: prevention and reaction Managers should ensure that their staff are properly prepared, both to minimise security XE "Incidents"  risks and to respond to incidents. At Annex 28 are listed suggested ways of reducing the risk of different types of incident, and of reacting to incidents if they occur. Reporting of incidents Good reporting XE "Reporting"  of XE "Incidents: incident reports"  an incident can reduce its consequences. It can result in quick reaction by the police or XE "Police: local"  other organisations; it can warn colleagues enabling them to avoid the same incident; and can help to improve security procedures. Incident reports are usually of the following kinds: Immediate incident report (sent by radio as soon as possible after the start of the incident, containing only a brief, urgent summary of what has happened) Updates (sent as often as necessary, while the incident or the response to the incident continues) Full incident report (usually written, sent once the incident has been stabilised or resolved) Annex 29 contains suggested formats for each of these kinds of incident report. It is good practice to establish a Security Incident File in each field office, held on paper or in electronic form. The incident reports of all security incidents are filed in it, to provide an instant overview of security incidents in a given period. This is preferable to searching through the e-mail or other archives to find the relevant reports. Reporting near miss incidents Near miss incidents should be reported in the same way as real XE "Reporting"  XE "Near miss incidents"  XE "Incidents: near miss incidents"  incidents. A near miss is where it appears that a security incident came close to occurring. It may reveal a weakness in security procedures, or new information about security threats. It should be reported so that security procedures can be reviewed in the light of it. Debriefing after an incident After a security incident, a debriefing should normally be held for all staff affected by it. This enables the facts to be confirmed, changes in procedures to be discussed, and helps morale. Debriefing is usually also necessary on an individual basis for any member of staff directly involved. This has the same purposes as the group debriefing. It is also an opportunity for the person concerned to talk through their reactions to the incident. If they request counselling or medical help, or if the manager considers that either may be needed, the manager should seek professional advice. Managers should note any signs of stress among staff, bearing in mind the possibility XE "Stress"  XE "Post-traumatic stress disorder"  of Post-Traumatic Stress Disorder (PTSD) or other stress-related illness. If stress-related illness is suspected, professional advice should be sought a stress debriefing conducted by someone who is not properly trained may do more harm than good. Analysis of incidents and adjustment of procedures After an incident, XE "Incidents: incident analysis"  managers should think through the events and consider whether there are any lessons to learn. For example, should staff be better briefed? Should procedures be adjusted? Should a particular route be avoided? Should there be better liaison with the police? Should disciplinary action be taken against any member of staff? Managers should consult relevant staff when considering lessons from an incident, to ensure that all possible lessons are identified and that staff support the conclusions reached. Records of all security incidents should be kept, and analysed from time to time. Locations of incidents should be plotted on a map. What do the incidents reveal about the nature of the local situation and its threats XE "Threat: assessing threats" ? Is there a pattern? Can any trend be discerned? What action should be taken as a result? It is vital to share reports of incidents with other humanitarian organisations, so that all can benefit from increased knowledge of the security situation. If there is a UN or other security officer in the area, he or she may coordinate the collation of information about incidents. Medical evacuation (Medevac) If a staff member is injured XE "Medical: emergency"  or falls ill and local medical facilities cannot provide sufficient treatment, medical evacuation (Medevac) may be needed. This normally happens only when a doctor advises that it is necessary. See Annex 20 for a suggested Medevac procedure. Many humanitarian organisations insure against the costs of Medevac, and have arrangements with specialist Medevac companies. If so, it is vital that all relevant staff know the procedure for making use of these. Fatal incidents If a staff member dies XE "Fatal incidents"  XE "Death of staff member" , good practice normally requires at least the following procedures: Confirm the identity of the deceased (mistakes do happen) Inform the Next of Kin (see XE "Next of Kin: informing Next of Kin"  Annex 22 for suggested procedure for informing Next of Kin) Inform the local authorities Secure the body Post-mortem examination, if required Arrange for repatriation of the body. This can be a complex and difficult bureaucratic process Cooperate with local authorities, in the event of a police or judicial investigation Inform the media, if and when appropriate Ensure that any compensation or insurance XE "Insurance"  payments are made swiftly Provide assistance if appropriate to the deceaseds Next of Kin and/or dependents Investigation by the employing organisation into the events leading to the death. Depending on the circumstances, this may be conducted internally or independently. Identify any lessons to learn from the incident and adjustment of policies or procedures as necessary Investigation of a serious incident Some incidents are so serious XE "Incidents: serious incidents"  that they require a full investigation by a suitable person not connected with the incident. Precisely which incidents require such investigation is a matter for each organisation. They are likely to include: Death Sexual violence Serious injury Major fraud Major theft XE "Theft"  Some serious incidents result from failure to follow agreed security procedures. Investigations should aim to identify what caused the incident, and should recommend any disciplinary action necessary. They ensure that there is accountability for serious loss or damage to staff or property, and are an important part of good security management. Media handling after a security incident The media may take a close interest in a security incident XE "Media: after a security incident" , particularly if it is serious. See Annex 19 for tips on media handling. Suspension, Hibernation, Relocation, Evacuation Deciding whether to suspend, hibernate, relocate or evacuate If the situation becomes XE "Relocation"  XE "Hibernation"  XE "Evacuation"  too dangerous for humanitarian operations, work should be halted. Depending on the circumstances, the halt may be temporary or permanent. Stopping work temporarily is commonly known as suspension of the programme. Stopping work permanently and leaving the area is known as evacuation. A middle option, involving stopping work for a considerable time and keeping a low profile to allow the danger to subside, is sometimes known as hibernation. A final alternative is to relocate some or all staff, while remaining within the country. Deciding to suspend, hibernate, evacuate or relocate is difficult. No formula can decide: only managers can decide, using their judgement and taking whatever advice they think necessary. Bear in mind that evacuation may expose staff to danger while they are evacuating. It is likely to be necessary when the current situation of staff is untenable, or where staff are already hibernating and the situation is expected to worsen. The decision is normally taken by HQ, on the advice of the senior manager present in the field. If it is not possible to contact HQ, the senior manager present in the field should have the authority to decide to evacuate if a decision is urgently required. It may happen that HQ decides on evacuation against the advice of the senior manager present in the field, in which case the evacuation should normally still take place. The essential question is: Do the potential risks of working outweigh the likely benefits? If they do, then the work should stop. If they do not, then the work should probably continue. Secondary questions may include: What are other humanitarian organisations planning to do? Will they suspend, hibernate or evacuate or continue work? Will they take any new security measures? What is their view of the balance of risks and benefits? Be aware that actions by other humanitarian organisations may place you at greater risk. How is the situation likely to change in the near future? How are needs likely to change in the near future? What other security measures could we consider, which might enable the programme to continue? Rather than stopping work, might we consider reducing staff levels, reducing travel, or altering procedures so as to reduce risks? Is there any further information that we need in order to reach a decision? Individuals should normally be free to leave if they consider the risks of continuing too great. Most humanitarian organisations have a policy that: Any staff member may choose to leave an insecure location, and that their decision to do so will always be respected; but If instructed by a manager to leave an insecure location, all staff must obey Suspension of programme activities Suspending programme XE "Suspension of a programme"  activities may be necessary simply to avoid a threat which has recently emerged. It may be necessary in order to allow time for reflection on a changed security situation. It may also be used in order to send a signal to local authorities or XE "Local authorities"  to other groups that threats to humanitarian organisations are not acceptable. Suspension is likely to be more effective if carried out by all humanitarian organisations at the same time, and for the same stated reasons. Suspension may be announced in the media. Alternatively it may be unannounced, depending on the circumstances, the threats, and on the purpose of the suspension. It is advisable to discuss the possible options for suspension with donors during the project design phase, so that funding problems are minimised if it becomes necessary to suspend activities. Hibernation A longer period of suspension, where staff remain at home or in a safe place for a considerable time in order to allow danger to subside, is sometimes known as hibernation. Ensure that sufficient resources are available for the duration of the hibernation period. Relocation or reduction of staff An alternative to suspension XE "Staff: relocation or reduction"  or hibernation is to relocate staff to a safer location, without leaving the country. A further alternative is to reduce the numbers of staff working, so as to reduce risk. Evacuation When the situation is too dangerous for humanitarian staff to remain in the area, evacuation is necessary. Evacuation normally means the cross-border movement of staff. The decision to evacuate should not be taken lightly, since its consequences can be far-reaching and may include: Increased threats XE "Threat: resulting from evacuation"  to your own or other humanitarian organisations Increase in workload for other organisations if they remain Misunderstanding by local people Increased needs among local population XE "Local population"  as the humanitarian programme ends Termination of employment for many staff Loss of property if looting or theft follows evacuation Difficulty in re-establishing a programme in the future Evacuation is likely to involve most, if not all, of the following steps: Consult senior staff Consult HQ Decide to evacuate Inform all staff Inform relevant embassies XE "Embassies" , if appropriate Plan the evacuation (outline evacuation plans should already exist in the security plan; these should now be adapted and made more detailed) Identify those staff who will leave and those who will stay (if any) Identify property that will leave and property that will remain; hide high-value property if possible Provide clear instructions for any staff remaining Provide pay and other money required by any staff remaining Inform local authorities of the evacuation if appropriate Inform HQ of detailed plan Carry out evacuation Inform HQ that the evacuation is complete Inform relevant embassies XE "Embassies"  that the evacuation is complete Debrief staff after evacuation, and make counselling available if necessary Write post-evacuation report, including a detailed account of the position of all staff, property and money, and any issues still unresolved Keep in contact with remaining staff (if any) When appropriate, plan your return Annex 10 contains a suggested checklist for points to consider when planning and carrying out an evacuation. In most cases, humanitarian organisations have a stated policy that nationally-recruited staff are not XE "National staff: evacuation"  normally evacuated from areas in which they live. Reasons given for this policy include: The prohibitive cost of evacuating and then providing for large numbers of nationally-recruited staff Nationally-recruited staff usually have families in the area and do not normally wish to leave them Nationally-recruited staff are in many cases not threatened as much as international staff This policy is sometimes made explicit in the contracts signed XE "Contracts: during evacuation"  by nationally-recruited staff. Nevertheless, it may be sometimes be appropriate and possible to relocate national staff and their families, within their country, or to provide them with the means to do so themselves. In exceptional circumstances, where lives are at risk, it will be necessary to decide on a case-by-case basis whether to evacuate particular staff members and their families. There may be no legal requirement for organisations to do so (though the duty of care may constitute a legal requirement to evacuate staff in some situations), but in some cases a moral obligation may exist to protect staff when at grave risk. In other cases nationally-recruited staff may continue running the programme, or a modified version of it, while the international staff are absent. This may be possible if the risks to nationally-recruited staff are significantly lower than to international staff. In this case, clear procedures and good communications with HQ are essential. Role of the United Nations in evacuation If the UN decides XE "United Nations: role in evacuation"  to evacuate, it is likely to play a leading role in the evacuation of other humanitarian organisations, if they decide to evacuate. The UN is under no obligation to assist another organisation, unless they have signed a Memorandum XE "United Nations: Memorandum of Understanding"  XE "Memorandum of Understanding (UN)"  of Understanding with that organisation to include it in UN security arrangements. See Annex 40 for further information. Debriefing after an evacuation After evacuation, the appropriate managers should debrief staff XE "Debriefing: after an evacuation"  to ensure that any outstanding issues are resolved as far as possible. These issues may include, for example: Needs of the population left behind: are there any ways that they can be met, now that the programme has ended or been modified? Will the programme be re-established? If so, when, how and under what conditions? Should staff remain on contract so as to be able to re-establish the programme as soon as that becomes possible? Termination or renewal of contracts; reassignment to other tasks Continuing contact with staff whose contracts have recently been terminated Management of remaining staff Feelings of loss or disappointment Campaigning or lobbying Media interviews Pay Compensation for loss of property Stress Treatment of any staff needing medical attention Future plans for the team and for individuals Corporate and individual expressions of appreciation for the work done by staff: consider a ceremony of thanks or a farewell party Media aspects of suspension, hibernation, relocation or evacuation The media may take an interest in an evacuation XE "Media: during suspension, evacuation, etc" . Some journalists may be tempted to give over-dramatic reports. If they decide to speak to the media about the evacuation, humanitarian organisations may wish to achieve one or more of the following objectives: Draw primary attention to the increased needs of the population after the closure or modification of humanitarian programmes Put across a true, factual account of the evacuation and the reasons for it, correcting any false accounts or rumours that may be circulating Call for action by governments, or other authorities or XE "Local authorities"  groups, to reduce the threats to humanitarian organisations, so that they may resume work Express the hope of re-establishing programmes in the near future Return after evacuation If it becomes possible to return to the area after an evacuation, a fresh security assessment XE "Security assessment"  (see Annex 26) will be necessary since the security situation is likely to have changed in important respects. Local relationships will need to be re-established, and it may take some time before there is sufficient confidence for programmes to be relaunched. In some cases nationally-recruited staff may have continued running the programme throughout the period of the evacuation. Due recognition of their achievement is likely to be important for the cohesion of the team. In particular, international staff should be careful not to give the impression that everything came to a halt when they left. Closing a programme The closure of a programme, for whatever reason, can have security implications. Staff are likely to be disappointed at losing their jobs. Local leaders, contractors, partners and beneficiaries may protest at losing the assistance that the programme brought. Care is needed to ensure that the closure is well managed and that security risks do not rise. Ending staff contracts The process of XE "Contracts: ending contracts"  terminating XE "Staff: ending contracts"  contracts should be carefully planned and sensitively managed. Contracts should have been drawn up initially with the possibility of short notice being given in times of crisis, so that staff know what to expect. Ties of loyalty may have built up over time, and some staff may feel that their loyalty is not being rewarded. Other staff may be tempted to steal from the organisation, now that they know that they have no future with it. There are thought to have been cases of disgruntled staff threatening or carrying out violence as a result of losing their jobs. Local employment laws XE "Legal aspects of employment"  XE "Employment laws and disputes"  and customs should be followed scrupulously. A good local lawyer is likely to be needed: his fees may be many times less than the cost of legal action which might result otherwise. Above all, the process should be fair, and perceived to be fair. Managers should ensure that at all times there is clear communication about the process, and consultation where possible. Redundancy payments and other compensation may be appropriate, or may be required by law. When considering such payments, organisations may wish to err on the side of generosity. This could be seen as a good security measure, encouraging departing staff to think and speak well of their former employer. Ending other contracts Contracts with local XE "Contracts: ending contracts"  companies, owners of buildings, and others may need to be ended. In a known insecure environment where a crisis is likely to result in termination of contracts at short notice then clauses can be written into contracts at the outset to deal with such a situation. Transparency, fairness and attention to detail are important. Once again, a local lawyer may be useful. Legal aspects of programme closure Any outstanding claims XE "Legal aspects of programme closure"  or legal cases should be resolved before the departure of the manager. To leave without such resolution could increase risks to staff and former staff, and to other humanitarian organisations. It would damage the reputation of the organisation, and make a future return difficult. Disposing of property Early decisions XE "Property disposing of"  should be made on how to dispose of the organisations property. Some may be sold. Some may be given to local organisations. Some may be taken out of the area by the organisation, for use in other programmes. These decisions will depend on the requirements of donors, on the rules of the organisation, and/or on the judgement of the manager concerned. Some governments have required departing humanitarian organisations to leave their property behind, arguing that, because the property was intended and funded for the benefit of local people, it should continue to be used for their benefit. This has sometimes included expensive items such as vehicles. The Red Cross/Crescent/NGOs Code of Conduct XE "Code of Conduct"  recommends that Governments should not restrict the re-exportation of relief equipment at the end of a relief operation, but some governments may not wish to follow this recommendation. To avoid misunderstanding over this issue, it is best if organisations clarify the final destination of equipment with the local authorities, during the initial security assessment before the start of the programme. Evaluation and inspection Evaluations or inspections of programmes XE "Evaluation" , including security management aspects, may be required by the organisation or by donors before the programme closes. These should be taken into account when planning the closure. In particular, will key staff be available for interview if required? If evaluations or inspections cannot carry out their work properly, an important element of security management will be lost. Handover of a programme In some cases a programme, or part of it, may be handed over XE "Handover"  to another organisation who will continue to run it after the departure of the organisation which launched it. Transparency, clarity, attention to detail and good communication with partners and beneficiaries are essential. Otherwise, misunderstandings and tensions may arise among local people, who may become hostile towards either organisation. Media aspects of closing a programme If media XE "Media: during programme closure"  announcements are planned, they should be designed so as to give maximum clarity to local people about the programme closure, and to minimise any sense of disappointment. Farewell events Any farewell XE "Farewell events"  celebrations should be humble, if possible with local beneficiaries the centre of attention. All staff, particularly nationally-recruited staff, should be warmly thanked for their work. Any impression of self-satisfaction, complacency or arrogance is liable to reduce acceptance by local people, not only of your organisation but possibly of humanitarian organisations in general. That may indirectly increase threats to the organisation, or to humanitarian organisations in general. Debriefing after programme closure Senior managers at HQ XE "Managers: senior managers"  should invite staff XE "Debriefing: after programme closure"  from the recently closed programme to a debriefing on the programme. Sufficient time should be set aside to do justice to the scale of the programme. Security aspects, from the earliest assessments to the closure of the programme, should be discussed. Senior managers should ensure that any lessons learned result in changes to security policy or procedures. Archiving documents after programme closure All security-related documents and reports should be archived properly XE "Archives" . This enables accountability should any future investigation be made. It can also protect the organisation against any false claims. Care should be taken when removing documents from the country. There have been examples of the authorities searching departing humanitarian staff, finding sensitive documents XE "Sensitive documents" , and imprisoning the staff as a result. Headquarters management of security Responsibilities of Headquarters for security management HQs of humanitarian organisations have XE "Headquarters aspects of security"  important security responsibilities XE "Managers" . They include the following: Setting the security policy for the organisation Producing generic security procedures for the organisation, which can then be adapted to each different field context Insurance Training policy XE "Training: training policy"  Deciding on deployment or evacuation: HQ normally take the final decision on whether a team will deploy to a new country or region, and on whether a team will evacuate. HQ normally delegates authority to the field manager to evacuate if the situation is urgent and if he or she is unable to contact HQ. Providing competent field staff, particularly a competent and experienced field manager. This is one of the most effective contributions to good security management in the field. Preparation of field staff, through training, briefing and equipping Planning of field operations Allocating sufficient resources financial and human to ensure security, including security training Providing support to field managers and staff when required Overruling the field managers decisions when necessary. This should only rarely be necessary if the field manager is competent, experienced and well prepared. Monitoring the effectiveness of security management in the field Ensuring lessons are learned from experience and that policy and procedures are updated accordingly Managing the security of HQ staff and property Ensuring that senior managers in HQ XE "Managers: senior managers"  are well prepared to take timely security-related decisions when necessary. This includes the preparedness and implementation of a crisis management team XE "Crisis management team"  for managing certain serious or high-profile incidents. Encouraging a culture of good security throughout the organisation Humanitarian organisations should be aware of the extent of their legal liability if various contingencies were to occur. In particular, liability for negligence can be considerable if it is shown that, for example, a staff member has been injured as a result of insufficient preparation for work in an insecure location. HQ should take legal advice on this question. Hierarchy of documents: security policy, manual, plan A recommended simple hierarchy XE "Security policy"  XE "Security plan"  XE "Security manual"  XE "Manual (security manual)"  of key security documents is: Security policy giving overall policy for the organisation (see Annex 32) Security manual giving generic procedures for the organisation (see Annex 30) Security plan giving detailed procedures for a specific location (see Annex 31) In this way the different purposes of each security document are clearly defined, and a proliferation of documents is avoided. The security policy and security plans should both be short, to ensure that they are read. The manual is likely to be much longer since there are many security procedures that can apply to a wide variety of different situations. The security policy describes the organisations approach to security and sets out general rules for security management. A manual of generic security procedures is useful to field staff who should adapt procedures to suit the local context. This avoids the need to repeat generic procedures in the security plan for a particular location. Time is saved, and the security plan remains short and therefore more likely to be read by field staff. Other names sometimes used for a security manual include security handbook and standard operating procedures (SOPs XE "Standard Operating Procedures (SOPs)" ). If the organisation does not have its own security manual, it may find it helpful as an interim measure to use a manual produced by another organisation, modified or with an addendum that meets the particular needs of the organisation. Security plans are normally written by the field team leader, or other staff member who will be responsible for security management in a particular field location. If possible, they should be written in collaboration with all staff, national and international, who will be affected by them. It is good practice for a copy of each plan, and all updated versions, to be provided to HQ so that staff there can react appropriately in case of need. Security advisor Some humanitarian organisations employ one or more security advisors XE "Security advisor" . The purpose of this post, whether at HQ or in the field, is to advise managers and staff on good security management, and to support them in their security-related duties. The tasks of the security advisor should be clearly defined. They may include: Advising senior managers on security policy Drafting generic security procedures or a security manual, for approval by senior managers Assisting senior managers to monitor the effectiveness of security management Advising on the design and delivery of security training, briefing and debriefing. May also carry out training directly, particularly training of trainers. Advising on the procurement of suitable security-related equipment and services, such as insurance and consultancy Assisting with recruitment of any security-related staff Reviewing security plans produced by field teams Collating information on security incidents and near misses Collating organisation-wide lessons learned on security Assisting managers during security incidents The security advisor is not responsible for security management that rests with the line managers at each relevant level. Human Resources Management security aspects Providing the right staff XE "Staff: importance of quality staff"  XE "Human Resources management security aspects" , with the right experience and training, on XE "Training"  time, is one of the most important contributions to security management. Human resources managers need guidance and support from senior line managers if they are to succeed in this goal. Many humanitarian organisations have difficulty finding the emergency staff that they need. The result is often fewer staff, and lower quality staff, than life-saving programmes deserve. For good security management, as for general management, it is important to plan for long term personnel needs and invest sufficient resources so that enough good staff will be available for emergency operations. Organisations usually need to employ new staff for an emergency programme. The ability to recruit rapidly and effectively can make a great difference to the success, and the security, of the field team. Human resources managers have a role to play in checking that all staff are prepared for the field with the appropriate training, briefing and equipping. Most field staff will require insurance cover XE "Insurance" . Human resources managers should check that there is appropriate cover, and that the cover does not exclude relevant risks. Note that failure to maintain adequate insurance could lead to large claims being made against an employer, which in some cases could drive the employer into bankruptcy. In addition, the duty of care is not absolved by monetary compensation, so lawsuits XE "Legal risks"  are possible even if there is adequate insurance, if the organisation has been negligent. Human resources managers should ensure that staff performance appraisals include an appraisal of performance in security management, where appropriate. Serious or high-profile incidents A HQ is likely to play a role in managing certain serious or high-profile incidents, if the field XE "Incidents: serious incidents"  XE "Incidents: high-profile incidents"  team is unable to manage them alone. Senior managers should be XE "Managers: senior managers"  trained and prepared, as required, to handle such incidents. Examples may include: Death or serious injury to a member of staff Disaster affecting the ability of the HQ to function Mass casualties XE "Mass casualties"  XE "Casualties" , in the field or at HQ Communications failure Major fraud Kidnap and ransom XE "Ransom"  XE "Kidnap"  demand Compensation claim against the organisation arising out of a security incident Any incident which has generated or is likely to generate media interest A crisis management team XE "Crisis management team"  is likely to be necessary to handle such incidents. Such a team includes the necessary managers and support staff to manage a serious or high-profile incident for the whole of its duration. HQ should ensure that contingency plans XE "Contingency plans"  are in place for any eventuality that could have a high impact on the organisation or its work, including some of the above examples. International Humanitarian Law HQ may XE "International Humanitarian Law"  have a role to play in advising their staff on relevant provisions of International Humanitarian Law (IHL), and advocating for States or other parties to respect those provisions. See Annex 17 for further information on IHL. Advocacy and humanitarian space: Headquarters aspects HQ should be ready XE "Advocacy for humanitarian space"  to assist field managers in negotiating for humanitarian space XE "Humanitarian space" , and in advocacy for any political or other initiatives that the situation may require. In some cases this may include campaigning, preferably in combination with other organisations, for a properly mandated military force to intervene XE "Civil-military relations" . It may involve lobbying for proper distinctions to be preserved between military and humanitarian organisations, and their respective objectives. HQ should be aware of the possibility of advocacy messages endangering field staff, local partners or local people. For this reason, field managers should control the development and delivery of advocacy messages. Creative thinking and bold advocacy, based on well-researched evidence and mature reflection, can have a great and beneficial impact on the security of a humanitarian operation, and therefore on the safety of the local population XE "Local population" . Archives HQ should ensure that archives are kept XE "Archives"  containing all relevant records XE "Financial security: accounting records"  from field programmes. This helps accountability, and can protect the organisation against false accusations in future. It also provides a back-up in case records are destroyed by fire or in conflict. Discipline A disciplinary system should XE "Discipline"  only be needed rarely, but it is a necessary part of security management. Staff should be aware that a breach of security procedures can be a disciplinary offence. Managers should lead by example, and should check that staff do not take dangerous short-cuts with security. Duty officer system A duty officer system in HQ XE "Duty officer"  allows field managers and others to contact the HQ at any time of day or night, via a mobile phone or other communications method. The duty officer should have a full contact list and a briefing folder describing the actions to take in case of various contingencies. The system normally operates as a rota, with an alternative number to ring in case the main contact number does not respond. Relating to the UN Security System UN operational agencies XE "United Nations: security system"  are part of the UN Security System. Other humanitarian organisations are not part of the System but may wish to be in ongoing dialogue with the UN (UNSECOORD or XE "United Nations: Security Coordinator (UNSECOORD)"  another appropriate body) to promote good practice in security management by humanitarian agencies. In 2002 XE "United Nations: Inter-Agency Standing Committee (IASC)"  XE "Inter-Agency Standing Committee (IASC)"  the UN Inter-Agency Standing Committee, in consultation with NGOs, produced a Menu XE "United Nations: Menu of Options"  XE "Menu of Options for UN-NGO Security Collaboration"  of Options for UN-NGO security collaboration. It is summarised at Annex 41. NGO HQs should be aware of this Menu of Options, and disseminate it to field managers. Relating to donors Many donors take an active interest in good security management and will wish to maintain an ongoing dialogue with HQs of humanitarian organisations. This enables informed funding and policy decisions to be made, which can be of value in supporting effective security management both in the organisation and more widely across the sector. Codes and Standards The Red Cross/Crescent/NGOs Code of Conduct XE "Code of Conduct"  The Code of Conduct XE "Code of Conduct"  for the International Red Cross and Red Crescent Movement and NGOs in Disaster Relief contains at least XE "Standards and Codes"  XE "Codes and Standards"  the following security-related points: Host governments should facilitate rapid access to disaster victims for Non-Governmental Humanitarian Agencies (NGHAs) Donor XE "Donors"  governments should use their good offices to assist NGHAs in obtaining access to disaster victims. Donor governments should recognise the importance of accepting a level of responsibility for the security and freedom of access of NGHA staff to disaster sites. They should be prepared to exercise diplomacy with host governments on such issues if necessary. Governments should facilitate the timely flow of relief goods and information during disasters Governments should not restrict the re-exportation of relief equipment at the end of a relief operation Host governments should authorise relief personnel to utilise all means of communication required for their relief operations Host governments are urged to provide NGHAs with information on potential security risks they may encounter Host governments are urged to designate, prior to disaster, a single point-of-contact for incoming NGHAs to liaise with the national authorities In the event of armed conflict, relief actions are governed by the relevant provisions of international humanitarian law Inter-Governmental Organisations (IGOs) should extend security protection provided for UN organisations, to NGHAs. Where security services are provided for inter-governmental organisations, this service should be extended to their operational NGHA partners where it is so requested. IGOs should provide NGHAs with the same access to relevant information as is granted to UN organisations. IGOs are urged to share all information, pertinent to the implementation of effective disaster response, with their operational NGHA partners." People In Aid Code Principle 7 of XE "People In Aid Code"  the People In Aid Code of Good Practice in the management and support of aid personnel is entitled: Health, Safety and Security. It states: The security, good health and safety of our staff are a prime responsibility of our organisation. We recognise that the work of relief and development agencies often places great demands on staff in conditions of complexity and risk. We have a duty of care to ensure the physical and emotional well-being of our staff before, during and on completion of their period of work with us. Further detail is given at Annex 23. Sphere Project Some humanitarian organisations subscribe to the Sphere standards XE "Sphere project" . Common Standard 7 of the Sphere Project Humanitarian Charter and Minimum Standards in Disaster Response requires that: "Aid workers possess appropriate qualifications, attitudes and experience to plan and effectively implement appropriate programmes." While this does not mention security explicitly, there is a clear implication that aid workers must be capable of managing their own security, and the security of their teams if they are managers, in situations of insecurity. Signatories of the Sphere Project should plan accordingly. InterAction Field Cooperation Protocol In 1996 a number of members of InterAction, the US NGO umbrella organisation, signed a Field XE "InterAction Field Cooperation Protocol"  Cooperation Protocol. The signatories agreed to instruct their representatives engaged in disaster response to consult with other NGO representatives similarly engaged to try to reach consensus in dealing with a wide range of issues including security arrangements, and in particular: Hostage policy Payment of extraordinary fees Location of housing Communications channels and procedures Evacuation planning Convoy organisation and scheduling Protection of sensitive information XE "Sensitive information"  Learning and training Security lessons learned At regular intervals during XE "Training"  a programme, and after its closure, the programme manager and staff should identify lessons to learn relating to security. A named manager at the appropriate level should be held responsible for ensuring that any security lessons identified are fed into policy, procedures or plans as required. He or she should compare lessons between operations, and share them with other organisations. Evaluations Evaluations should examine XE "Evaluation"  the effectiveness of security management as part of their terms of reference. They should also evaluate whether programmes were designed to take account of security considerations. Evaluations should take place, if possible, during the lifetime of the programme, to ensure that relevant staff are available for interview. A named manager at the appropriate level should be held responsible for ensuring that any security lessons identified in evaluations are fed into policy, procedures or plans as required. Training Training for new field staff Each humanitarian organisation has a duty of care XE "Training"  to its staff. It is responsible for ensuring that staff who will be working in an insecure situation for the first time have at least a basic knowledge of how to stay safe. It is irresponsible and dangerous to send staff into insecure situations with little or no knowledge of the security risks and how to deal with them. Organisations will have varying interpretations of what amounts to responsible security preparation for new staff, and how best to organise it. A suggested training syllabus for new field staff is at Annex 36. Many of the above topics are best covered by training. Some may be covered by briefing. Relatively few of the above topics are covered by academic courses. Training for field managers Field managers are responsible XE "Managers: training"  for ensuring the security of their team. They are likely to need training and briefing specific to this role. Annex 37 gives a suggested syllabus for field managers. Again, a mixture of training and briefing is likely to be needed, to ensure that field managers have the necessary knowledge and skills for their job. Training for Headquarters managers Some HQ managers XE "Training: for HQ managers"  XE "Managers: training"  have a vital role to play in security management. They are likely to need preparation for at least certain aspects of their responsibilities. The following are some examples: Assessing threats XE "Threat: training"  to the organisation Awareness of world trends affecting the security of humanitarian organisations Balancing the risks against the likely benefits of a programme Managing serious or high-profile security incidents, such as kidnapping Handling the media during a security incident Kidnap negotiations Dealing with mass casualties XE "Mass casualties"  XE "Casualties"  Security at HQ offices XE "Offices"  Standby arrangements if the HQ ceases to function Sharing knowledge and good practice on security with other organisations Exercises or rehearsals may be necessary to prepare for some of the above tasks. Others may be covered by training or briefing. Learning from other agencies and networks There are a number of NGO networks XE "Training: trainers" , training organisations and other bodies actively engaged in improving security management. Humanitarian organisations may find it helpful to keep in touch with these. Examples include: Bioforce XE "Bioforce"   HYPERLINK "http://www.bioforce.asso.fr" www.bioforce.asso.fr InterAction  HYPERLINK "http://www.interaction.org" www.interaction.org People In Aid  HYPERLINK "http://www.peopleinaid.org" www.peopleinaid.org RedR  HYPERLINK "http://www.redr.org" www.redr XE "RedR" .org A number of commercial companies provide training and other learning services such as management consultancy. The Security Training Directory XE "Security Training Directory"  accompanying this Guide has details of some of these. Use of experienced staff as trainers, briefers, advisers, evaluators Experienced field staff XE "Training: trainers"  XE "Staff: use of experienced staff"  are a valuable resource for training and briefing current and future field staff. Some may have returned from the field temporarily or permanently, and may therefore have considerable time available. Humanitarian and training organisations may wish to make use of them for: Training current and future field staff Briefing on situations where they have recent experience or knowledge Advising on security policy or procedures Evaluating security management Assisting security assessments or other security tasks Donors Donors are usually willing to provide funding for appropriate security measures, primarily field-oriented, that will improve the effectiveness of the team and its programmes. Some donors indicate that they are prepared to fund security measures to a greater extent than humanitarian organisations have requested in the past. Normally, donors do not specify certain security measures or practices. In most cases, they do not have the time or detailed knowledge of a particular context to do so. Furthermore, the Code of Conduct XE "Code of Conduct"  for the International Red Cross and Red Crescent Movement and NGOs in Disaster Relief recommends (Annex II) that Donors should provide funding with a guarantee of operational independence. Accordingly, donors form a view of the competence of the partner before funding, and rely on evaluations to verify that security, among other aspects of the programme, was well managed. Abbreviations The following abbreviations are XE "Abbreviations"  used in this Guide. ANSOThe Afghanistan XE "ANSO (Afghanistan NGO Security Office)"  NGO Security Office CAPConsolidated Appeal Process (UN)DO(UN) Designated Official for SecurityDSA Daily Subsistence Allowance (UN)ECHOEuropean Commissions Directorate-General for Humanitarian Aid ERWExplosive Remnants of WarFMFrequency Modulation (the normal radio type for local broadcast radio)HFHigh Frequency (long-range radio)HICHumanitarian Information CentreHQHeadquartersIASCInter-Agency Standing Committee (of the UN)ICRC International Committee of the Red CrossIEDImprovised Explosive DeviceIGOIntergovernmental OrganisationIHLInternational Humanitarian LawMedevacMedical EvacuationMOSSMinimum Operating Security StandardsMREMine Risk Education XE "Mine Risk Education (MRE)" NGHANon-Governmental Humanitarian AgencyNGONon-Governmental OrganisationODIOverseas Development InstitutePTSDPost-Traumatic Stress DisorderR&RRest and RecreationSitrepSituation ReportSMTSecurity Management TeamSOP Standard Operating Procedure SRSGSpecial Representative of the Secretary-GeneralUNUnited NationsUNHCRUN High Commissioner for RefugeesUNSECOORDUN Security CoordinatorUXOUnexploded OrdnanceVHFVery High Frequency (short-range radio)Important information about this Guide Acknowledgements We gratefully acknowledge the help of staff and managers from ECHO, UN agencies and secretariat, the Red Cross/Crescent Movement and NGOs who were interviewed during the course of the preparation of this Guide. A full list of organisations consulted appears in the Report which accompanies this Guide. Many existing manuals and handbooks were helpful to the preparation of this Guide. We particularly acknowledge the CARE International Safety and Security Handbook, to be published in the near future. We also thank John Cosgrave and Jan Davis for their helpful comments on drafts. Finally our thanks go to Mrs Costanza Adinolfi, Acting Director-General, at whose initiative this Review was undertaken, and Peter Cavendish, Val Flynn and Siobhn Caughey of ECHO, who gave invaluable support. Authors and date The ECHO Security Review, of which this is part, was prepared by Katy Barnett, Barney Mayhew and Graham White of The Evaluation Partnership ( HYPERLINK "http://www.evaluationpartnership.com" www.evaluationpartnership.com), and submitted to ECHO in October 2004. The author of this Guide was Barney Mayhew. Funding ECHO provided XE "ECHO"  full funding for this Guide. Copyright Copyright for this XE "Copyright of this Guide"  document is held by the European Commissions Directorate-General for Humanitarian Aid - ECHO. Copying of all or part of this document is permitted, subject to the disclaimer below the table of contents, provided that the source is acknowledged. This permission does not include the photographs used in this document, except when copied as part of this document. For permission to reproduce them separately, contact the copyright owners of the photographs, listed in this chapter. Software and languages This Guide is available in English in pdf XE "Software"  and Word formats, and in French, Spanish and Arabic in Word format. Further copies Further copies of this Guide may be requested by e-mail from  HYPERLINK "mailto:echo-eval@cec.eu.int" echo-eval@cec.eu.int or downloaded from ECHOs website: see the ECHO home page at  HYPERLINK "http://www.europa.eu.int/comm/echo/index_en.htm" www.europa.eu.int/comm/echo/index_en.htm. ECHO contact The ECHO contact for security matters is Mr Val Flynn, ECHO HQ XE "ECHO"  and Field Security Co-ordinator. Tel: +32 2 299 0983 Fax: +32 2 299 1172 E-mail:  HYPERLINK "mailto:Anthony-Val.Flynn@cec.eu.int" Anthony-Val.Flynn@cec.eu.int Web:  HYPERLINK "http://www.europa.eu.int/comm/echo/index_en.htm" www.europa.eu.int/comm/echo/index_en.htm ANNEXES: CHECKLISTS, TEMPLATES AND FURTHER INFORMATION Buildings and security By paying attention XE "Warehouses"  XE "Offices"  XE "Buildings"  XE "Accommodation"  to a number of important details, you can greatly improve the security of your offices, warehouses and accommodation buildings. No building is totally secure, and most humanitarian organisations will not wish to live or work in a heavily fortified building except in extreme circumstances. Instead, it is often preferable to blend in with the local community, while taking discreet precautions to make your buildings as secure as possible. Each situation is different, and calls for careful judgement by an experienced manager. Factors to bear in mind when choosing a building include: General location Is it in a location that will enable your programme to run effectively? (Is it close enough to the beneficiary population? Does it have good access to routes and locations that are important for your programme?) Is it in an area of relatively low crime? Is it near the transport routes that are important to you, including potential evacuation routes? Is the building accessible from many access points, or only one or two? (One or two may be easier to control.) Is it discreetly located, or is it in a high profile location? Which is more beneficial to your security, in the current situation? Is the building overlooked? Does that matter in the current circumstances? Are access routes to the building free from places for people to conceal themselves? (Keep shrubbery and bushes around residences trimmed low.) Are external electrical, telephone and gas supply boxes locked? Is the building in an area prone to flooding, earthquake or XE "Earthquake"  other problems? If so, is it protected against these? Are there any health risks in the area? (E.g. sewage or rubbish facilities) If fighting were to break out, would the building be potentially exposed to direct fire? Is the building close to a sensitive location? (E.g. a military or police barracks; a political party office; the house of a prominent politician, etc.) If so, might it embarrass your organisation to be associated in peoples minds with that sensitive location? If a nearby location is likely to be targeted by violence, consider whether it might affect your building. Is the building close to a dangerous location? (E.g. a fuel store) Are the police or other security XE "Police: local"  forces within a reasonably short distance, so that if you need their help they will be quick to arrive? Physical security of the building Are the walls strong enough to withstand likely threats? Are the windows barred? Are the doors strong? Check locks, hinges, bars. Is there a perimeter wall? How easy/difficult is it to surmount? Does it have barbed wire? Does it need barbed wire, or would that send the wrong signal to local people? Are its gates strong? Can a guard look through the gate without opening it? Is the roof difficult to access from the outside? Is there sufficient lighting, externally and internally? Is there a suitable location for a safe XE "Safe" ? Is there a suitable shelter XE "Shelters" , in case of armed robbery, attack or fighting in the vicinity? A shelter should preferably be behind thick walls and out of sight of any window. Sometimes a central room or inner corridor is suitable. (See Annex 33 for more details on shelters.) Is there storage for valuable items? Is there an alarm system XE "Alarms" ? Are there sufficient fire safety measures, such as smoke alarms, fire alarm, primary and secondary escape routes? (See Annex 12 on fire safety procedures.) Are electrical installations sound and safe? Is there sufficient parking, and will vehicles be secure? If there is a threat of car bombs, is there sufficient distance from the building to the parking area? If there is a threat of any kind of bombs XE "Bombs" , consider measures such as concrete barriers, blast film for windows, police control of vehicle access. In such cases specialist advice on protection from bomb threats should normally be sought. What improvements will you need to make before the building is secure enough for your use? How long will they take? What will they cost? For example, will blast film be needed for the windows? Do any walls need strengthening around the shelter? How many guards will be necessary? Is there a shelter for them? Will you place a sign on the building to show that it is occupied by a humanitarian organisation, and if so how prominent should it be? This depends on the local situation and the perceptions of local groups about your organisation. Local infrastructure What is the state of the roads leading to the building? Is the power supply reliable? If not, how big a generator XE "Generators"  will you need? Is the water supply reliable? If not, will you need to install your own water system? Arrangements for receiving visitors Is there a place where visitors can XE "Visitors: waiting area"  wait? Will it be easy to control visitors? Reception staff where will they be and how many will you need? Can visitors be seen before the gate or door is opened? Which areas should be accessible to visitors? Will visitors need to be escorted within the building? Will visitors identity badges be needed? Will designated visitors hours be needed? Striking the right balance between security and courtesy: making visitors feel welcome without compromising security Location of meeting rooms Identity of the owner Who is the owner? Is he or she reliable and of good reputation? Does he or she have connections that you should be aware of? Checkpoints Checkpoints are widely XE "Checkpoints"  used in many countries. Many checkpoints have a legitimate purpose, for example to prevent weapons from entering an area. Some checkpoints have little purpose other than to harass. Some checkpoints are used for example by bandits or undisciplined soldiers as a cover for ambush XE "Ambush" , theft or violence. Staff should be trained and briefed on how to handle themselves at checkpoints. The best approach may vary from situation to situation. Often the following points may be helpful: When approaching XE "Theft"  or leaving a checkpoint, inform base by radio. Do so in a discreet way, far enough from the checkpoint to avoid them seeing that you are using the radio. Turn the radio to low volume or off, to avoid it attracting attention at the checkpoint. Observe the checkpoint from a distance, without stopping, to understand what is happening there. Does everything appear normal? Or are there signs that there may be a problem? If you suspect that there is a risk of violence or other serious problems, turn round and drive steadily away, if it is safe to do so All passengers should remove sunglasses before arriving at the checkpoint. Keep valuables out of sight. It is best to travel without valuables, if possible. If it is at night, switch off headlights, leaving sidelights on, and switch on the interior light so that the checkpoint can see the vehicle occupants Approach the checkpoint slowly and stop several metres before the barrier Remain inside the vehicle unless you are ordered to get out Make no sudden movements. Even moving your hand to release the seat belt could sometimes be interpreted as reaching for a weapon so announce what you are doing before you do it, and move slowly. If one person is asked to come away from the vehicle, for example to an office to check papers, consider whether it is safer for another person to accompany them Be ready to answer questions about the occupants, your journey, the vehicle and anything in it One person should be nominated to do the talking, on behalf of all the occupants, unless questions are put directly to other occupants Your manner and style are very important: be courteous and friendly, but not over-familiar. Treat the soldiers or police as human beings. They have a boring job to do, and are likely to give you an easier time if you show an interest in them. If appropriate, chat a little, perhaps about their family. If they ask you to do things that are incorrect (such as to give them a present), be politely firm in refusing, and use gentle humour if appropriate. (See Annex 4 for suggestions on how to avoid bribes.) Be ready to show any relevant documents including vehicle documents, authorisations, copies of passports and ID cards. If possible, avoid showing the original of your passport, to avoid it being stolen but in some cases the original may be required. It may be helpful to keep your ID card on a chain around your neck so that you can show it without surrendering it. If you suspect that the checkpoint may have a hostile intention, depending on the circumstances it may be sensible to keep all doors including the cargo door locked, with windows more than half-way up. But in some circumstances this may anger soldiers or police, so use your judgement as to which is best. Allow the car to be searched if they insist on it Some organisations have to use sensitive documents XE "Sensitive documents"  for their work. Do not carry sensitive documents if you can avoid it. If you must carry them, and if you are searched, you may try to insist that they do not see them. But if they threaten you, you will have to give in. Therefore keep documents out of sight, so as not to attract attention. If threatened with a weapon, comply calmly with their instructions When leaving the checkpoint, turn the radio volume up and inform base that you have passed the checkpoint If not allowed to pass through, return to your base and report to your team leader. He or she is then likely to negotiate with relevant authorities for a resumption of free movement in the area. Have a clear policy on giving lifts. Humanitarian staff are often asked to give lifts to soldiers at checkpoints, armed or unarmed. Most humanitarian organisations forbid giving lifts to any military personnel. Ensure everyone knows how to respond in such a situation as well as a situation when a soldier is injured and needs medical assistance. If necessary, be prepared to turn back. Convoy procedures A convoy is XE "Convoys"  a group of vehicles travelling together. This can be advisable when individual vehicles are at greater risk of theft or violence. If required and if appropriate, a convoy may be escorted by a police XE "Police: local"  or military escort XE "Civil-military relations" . Humanitarian organisations will usually try to avoid the need for a military or police escort, because of the risk that it will compromise their independence in the eyes of local people. Instead they rely on negotiation XE "Negotiation"  with local leaders, while preferring that legitimate security forces provide security for the whole area rather than just a particular road. See Annex 13 for some issues concerning armed guards, which may also apply to convoy escorts. Convoy procedures should be adapted to the local circumstances. The following checklist may serve as a prompt of some major issues to consider: Communications arrangements How should vehicles and occupants react if they come under fire? What to do in the event of accident, incident, casualty or breakdown Checkpoints and roadblocks Identification of vehicles Number of vehicles (from 4 to 6 vehicles are easily manageable) Order of travel Spacing between vehicles Roadworthiness of vehicles Equipment for each vehicle Documents required Stop and check loads and tyres how often? Convoy leader normally in front vehicle Assistant convoy leader normally in rear vehicle Slow vehicles in front; fast vehicles behind All vehicles to travel at the speed of the vehicle following Speed Halts Leave at the office a travel authorisation form giving intended and alternate routes and expected arrival times Inform authorities, and warn checkpoints ahead Is there a need to send an advance party, to check the route and prepare reception of convoy? Liaison with security forces in escort, if applicable Plenty of time allowed All staff should be fully briefed on the convoy procedures and plan Corruption: avoidance and prevention Corruption can XE "Corruption"  XE "Bribes"  threaten security. This is obvious in the case of theft or fraud, two kinds of corruption. It is just as true, though sometimes less obvious, in the case of other kinds of corruption, such as bribery. Any kind of corruption risks: Loss of goodwill from the local population XE "Local population"  Loss of honesty in relationships between colleagues or organisations, and therefore loss of reliability of information when passed between them Loss of trust between colleagues or organisations, and therefore loss of reliable allies when danger threatens Pressure and stress on staff, often particularly national staff XE "National staff: stress"  Reasons to avoid any kind of corruption include: It is usually against the law, and aid workers are bound by the law in the country in which they are working Corruption is something that hurts the poor by denying them free and fair access to the services that they are entitled to Humanitarian organisations are bringing in free help for people who need it, and it is morally wrong for officials to try to divert some of the resources intended for the needy Any corruption encourages more corruption Even the perception of corruption, or false accusations of corruption, can cause the same negative effects as real corruption. Great care should therefore be taken not to allow any perception of corruption to arise in connection with humanitarian organisations. In some countries the state has virtually ceased to function, and officials such as border police XE "Police: local"  have received no salaries for months, sometimes years. In these cases a system of charges provides them with an income. Aid agencies will sometimes regard this as necessary and understandable. In this case they may discuss the issue together, and agree on a joint position that ensures that everyone pays the same charges for the same services, and gets a receipt for any money paid. This compromise approach at least ensures that there is some accountability and transparency. Anti-corruption measures include: Clear, open, honest relationships with all local groups, with the local authorities and with other humanitarian organisations Good financial procedures Appropriate, transparent rules for procurement XE "Procurement"  Well-trained, experienced staff Good management of staff and projects Confidential, anonymous whistle-blowing XE "Whistle-blowing"  channels (for the reporting of corruption) A common position among humanitarian organisations, if possible, on what informal fees should be paid, if any A refusal to pay bribes at any time Many experienced humanitarians have found it possible to work for years in countries that have serious corruption, without ever paying a bribe. There are respectful and courteous ways of doing this. Consider the following, if appropriate to your personality, to the context and the culture: In answer to the question: Have you got a little present for me? answer: Yes a smile and smile genuinely as you do so Good humour, the time to talk for a minute or two and have a joke together these are sometimes quite sufficient to persuade a soldier at a checkpoint not to insist on a bribe. Often he is bored, and is grateful to be treated as a human being. Explain why you are not able to pay the bribe. Have various simple phrases that do not sound like an accusation of corruption for example: My head office doesnt allow me to pay any fee that isnt official. If a soldier is insistent, say that you are not able to pay the bribe, but that you are willing to speak to his commander. (The soldier will often not want his commander involved.) Be prepared to wait. Patience cures many problems, while impatience often increases the pressure to pay a bribe. At a checkpoint when you have reached an impasse, be prepared to wait an hour or two, while you keep negotiating politely, if its important to you to get through. Otherwise, consider turning back, and trying again another day. In the meantime, you could inform the higher military XE "Civil-military relations"  or police authorities of the problem that you faced, and get them to do something about it. The patience principle also applies to bureaucratic processes, such as NGO registration with the government authorities. In some countries this can take a year or more, leading to a temptation to try to hurry the process up. Remain courteous, respectful and if possible friendly. Some officials who normally insist on a bribe seem flattered and pleased when treated kindly, and waive the bribe as a result. Ensure that all your paperwork and documents are in order, and that you have copies of them with you at all times, so that if an official challenges you, the document is there to show. This may mean always having a bulky folder with you a small price to pay to avoid the hassle that you might otherwise face. Keep some picture postcards with you, and give one of them as a present of minimal value. Some people like to keep a packet of cigarettes on them even if they themselves dont smoke so that they can offer one (or two or five!) to the soldier at the checkpoint. Ensure you or your driver knows the traffic rules and respects them. Otherwise it is an open invitation to a policeman or traffic warden to threaten dire penalties unless you offer a bribe. Make sure that you and your colleagues respect the laws scrupulously, so that you are less likely to be accused of wrongdoing and therefore put in the power of law enforcement officials. Managers should lead by example in preventing and avoiding corruption, and should ensure that all staff follow this lead. Cultural awareness If staff are aware XE "Cultural awareness"  of the local culture or cultures in which they are working, they are likely to be more secure. They will understand more clearly what is happening around them. They will be able to show respect to local people and leaders, and communicate with them, more effectively. They will win greater local goodwill. All international staff should be briefed on the culture(s) in which they will be working, preferably both before arrival and on arrival in the field. It can be very helpful to have a written brief on the local culture(s) to give staff before they deploy. Often overlooked is that nationally-recruited staff also need to be briefed on the culture(s) of the international staff alongside whom they will be working, and on the culture of the organisation which is employing them. There have been many cases of humanitarian staff becoming deeply frustrated with their colleagues, or with local people and leaders, essentially because they have not been properly briefed on their cultural differences. Humanitarian programmes run more efficiently, including their security aspects, when there is mutual understanding. A few examples will serve to underline the importance of cultural awareness: In some cultures it is important to receive any gift with the right hand. Offence is caused if a gift is received with the left hand. In some cultures it is normal, and not impolite, for local people to: Stop and stare at foreigners Shout foreigner at foreigners they see in the street Ask personal questions of strangers, such as how old they are, or how much they earn In some cultures two fingers held up in a V shape means cool; in others it means victory; in others it means you support one particular side in the conflict In some cultures it is insulting to show the sole of your shoe to another person, for example when your legs are crossed In many cultures it is important to take plenty of time to greet people, engaging in small talk, before talking about work. In other cultures it is seen as a sign of inefficiency to waste time on small talk. The acceptable way to greet men and women differs greatly between cultures Sexual relationships between team members, or with individuals in the community, would in some cultures be offensive to local laws and customs, and in some cases could put the team at risk In some cultures it is not acceptable for female staff to XE "Staff: female staff"  XE "Female staff"  work closely with male staff, or to travel alone with male colleagues In many cultures it would be unacceptable for a male aid worker, driving alone, to give a lift to a girl or woman: the aid worker would be suspected of wishing to exploit her In almost all cases, it is important to take time frequently to chat to people, in their homes, on the street, in their offices, in the market. This helps your understanding of the whole environment, and so improves the likelihood of good programme and security decisions. If staff turnover is rapid, particularly of international staff, it is more likely that they will have a weak understanding of the local culture(s). Programme and security decisions are therefore likely to be weaker. Greater staff continuity, in most cases, is likely to improve the standard of security management. Equally, a thorough handover process between outgoing and incoming staff reduces the amount of knowledge and cultural understanding that is lost when a staff member leaves. Drivers: a basic checklist Road accidents are XE "Driving"  XE "Accidents"  one of the most common causes of death and injury for humanitarian staff. Good security procedures are seriously undermined if road safety is ignored. Ensuring that drivers are competent and disciplined greatly reduces the risk of accidents. It is essential for managers to take sufficient time, especially at the outset of an operation, to make certain that drivers are aware of their duties, properly prepared for them, and are disciplined in carrying them out. Stop to consider if a road journey is necessary. Can you do the same task using telecommunications or some other method? By cutting out unnecessary road journeys you reduce the risk of accidents. In particular, anyone travelling in a vehicle which is being driven too fast should insist that the driver slows down to a reasonable speed. Other causes of accidents include: Driver sleepiness Using a radio or telephone while driving Consumption of alcohol within 12 hours before driving Use of some medicines or other drugs Poor vehicle maintenance Poorly trained or inexperienced drivers Bad weather Time pressure for example, when driving to meet a deadline such as a border or checkpoint closure, or a curfew time It is good practice for drivers to have a checklist to help them remember their routine duties. Managers should hold drivers accountable for fulfilling the tasks on their checklist. Local circumstances will dictate what the checklist should include. As an example, a checklist might contain: Daily vehicle checks Fuel preferably full. Always keep at least half-full in case of emergency. Oil Coolant Brake fluid Water Tyres Spare wheels Tools: tow-rope, jack, wheel brace etc Full vehicle equipment (see Annex 42 for a vehicle equipment checklist) Screen-wash fluid Wipers Lights Horn First aid kit Fire extinguisher Spare fuel Spare water Torch/flashlight Map, and compass if necessary Paperwork including vehicle log; vehicle registration and insurance documents (or copies, depending on local requirements); travel authorisation form Radios working? Antennas in good condition? Winch (if fitted) working? Travel authorisation Get travel authorisation form signed Inform office on departure Road safety Plan the journey Not impaired by alcohol or drugs Avoid driving when likely to be sleepy Plan to share the driving if possible Ensure you will be well rested Book an overnight stop if necessary Plan the route, and alternative routes if necessary Plan when to take rest breaks at least every 2 hours Anticipate delays Safe and legal speed Defensive driving Know your location at all times Passenger comfort Consideration for other road users including pedestrians Particular care when children are nearby: slow down and given them a wide berth If you start to feel tired, find somewhere safe to stop, nap for 15 minutes or more, take two strong caffeine drinks If the vehicle malfunctions, or you hear an unusual noise, stop and get a qualified person to check it. Driving on could seriously damage the vehicle. Do not give lifts to strangers, nor to military, police or armed personnel Emergency contact card It can be helpful for staff in XE "Emergency contact card"  the field to carry a small emergency contact card in their wallet or purse. In most cases it is good practice for staff to carry the security plan with them at all times. But an emergency contact card may be easier to reach in an emergency, and can provide vital information such as telephone numbers if the security plan is lost. It can also be particularly helpful for visitors XE "Visitors: emergency contact card"  to the field. An emergency contact card should be designed to suit the particular circumstances. Information on it could include, for example: Callsign of base station Radio calling channel Radio emergency channel Important phone numbers How to call for help in an emergency brief summary Location and contact details of medical facilities Phone numbers and other instructions for Medevac XE "Medical: evacuation (Medevac)"  Ideally the card should be covered in plastic so that it is durable and waterproof. Equipment for personal security Personal equipment that XE "Equipment: personal"  may enhance your security will vary depending on the circumstances. The following list gives a number of items that can often be helpful. Remember that any equipment needs to be properly used in order to do its job of enhancing security. In some cases this will require training or supervised practice. Items that are usually essential in all environments are in bold. Adaptors for electrical sockets Alarm XE "Alarms" , such as a rape alarm or aerosol fog horn Body armour* XE "Body armour"  Clothing suitable to the environment you will be working in Documents (carried in a durable document wallet) including: Passport and/or identity card, driving licence and vaccination certificate (keep photocopies of these in a separate place, or carry copies and keep the originals in a separate place) Copies of any important authorisation documents The relevant security plan Emergency contact details Insurance certificate and emergency insurance phone numbers Spare passport-size photos E-mail communications typically a laptop computer and telephone landline, mobile or satellite phone First aid kit (see Annex 14 for information on first aid kits) Flashlight/torch Helmet* Insect repellent Map, preferably laminated or in a map case Map-marking pens Mobile phone and charger Money belt Mosquito net Notebook and pens Radio, short wave and FM, for listening to international and local news, plus spare batteries and/or charger Radio, two-way, plus spare battery and charger Surge protector (to protect electronic equipment when connected to unreliable power supply) Watch (robust and reliable, not valuable) Water bottle Waterproof coat Water purifying tablets Whistle * Body armour and a helmet are normally only needed in high-risk circumstances. Many humanitarian organisations would assess that, if such protection measures are necessary, the situation is too dangerous for their staff to be present at all. Therefore these items are only rarely used by humanitarian staff. Equipment for team security Team security equipment will vary XE "Equipment: team"  depending on the circumstances. The following list gives a number of items that can often be helpful. Remember that any equipment needs to be properly used in order to do its job of enhancing security. In some cases this will require training or supervised practice. Alarms XE "Alarms"  for issue to each building Battery chargers and other accessories E-mail system, tested and proven First aid kits (bear in mind the quality of local medical facilities when deciding what the first aid kits should contain) Foghorns (the aerosol can type, cheap and very effective) Generators XE "Generators"  Identifying stickers or flags, as appropriate Lighting equipment Maps of good quality and appropriate scale Money belts Padlocks Radios Safe(s) XE "Safe"  should be capable of being fixed securely to floor or wall Security manuals or handbooks Smoke alarms Telephones: mobile or satellite. Remember that mobile phone networks may be shut down during emergencies. Torches/flashlights Vehicles, equipped as required (see Annex 42 for a suggested list of vehicle equipment). All vehicles used, whether owned or hired, should be thoroughly checked for roadworthiness and correct equipment by a competent mechanic. Vehicle spare parts Whistles for guards (or aerosol fog-horns) Evacuation The following suggested procedure XE "Evacuation"  may be of help in designing your own evacuation plans and procedures. It should be adapted as required by your particular situation. PHASE ONE - PLANNING STAGE Evacuation planning and rehearsals should be carried out regularly. History has shown that the safety and security situation can deteriorate rapidly, often without warning. The evacuation plan should be written, and an outline included as a section within the security plan issued to all staff. When writing the evacuation plan, at least the following issues should be considered. Who will be evacuated - It is essential that all staff members clearly understand their and their families eligibility for evacuation or relocation assistance XE "Relocation" . Each field team should determine which staff members are essential; essential staff members are those required to conduct final coordination (Finance Officer for example), office closure, or limited, basic operations. Determine the evacuation order with Priority 1 evacuating first and Priority 4 last. Priority 1 International staff family members Priority 2 Staff members who are in immediate personal danger due to the conditions of the crisis Priority 3 Individuals other than essential staff Priority 4 Essential staff Where will staff be evacuated to? Identify a first-choice destination and an alternate destination for evacuation or relocation. Determine visa requirements, and the logistics that will be needed upon arrival at the destination(s). How will staff be evacuated? Establish a notification system to ensure everyone is informed of the impending evacuation. Determine and verify an assembly point where staff will gather after notification. Detail the method of evacuation (over land, by air or by sea). Identify potential evacuation routes to airports, seaports, or land borders. Check to ensure that these routes can be travelled under emergency conditions. Inspect border crossings and safe areas. Coordinate plans with embassies, UN agencies, and other NGOs as appropriate. What goes and what stays? Identify which documents, such as contracts XE "Contracts: during evacuation" , payroll records XE "Financial security: accounting records" , etc, will be needed to re-establish operations once relocated or upon re-entry. Other documents should be marked for destruction, or left behind, as appropriate. Consider how evacuated documents will be perceived if seized by a particular person or group. They may contain information that could put the evacuating individual(s) at risk due to misinterpretation, and would be better destroyed or left behind. Who is responsible for the various tasks during an evacuation? During crises key staff will be fully occupied so it is imperative that tasks and responsibilities for evacuation be clearly defined during the planning stage. What will be the expected impact of evacuation on the operation? Will the office be closed and, if so, how? What are the policies and plans for continuing operations through national staff members XE "National staff: evacuation"  acting on their own? Or through contractors, if feasible and appropriate? PHASE TWO - ALERT Mounting tensions and/or instability may lead the team leader, in consultation with HQ, to issue a recommendation to limit operations, increase security measures, and review the evacuation plan. Work outside the immediate vicinity of the field office may be suspended. Tasks during this stage include the following. Brief all national and international staff on the situation, if possible Communication systems for notification of staff should be finalized and tested. Consider tying into other systems, such as warden systems XE "Wardens"  for other NGO, UN or embassy staffs. Prepare salaries and other money required by national staff Back up important files onto disks, delete sensitive files, and destroy sensitive documents XE "Sensitive documents" . Be aware that deleted files still remain on a disk, and can be retrieved by computer specialists. Staff members and their family should check that they have personal documentation with them at all times Inventory all office equipment and assets. As appropriate, identify the equipment to be evacuated and responsibility for each item. Plan how high-value equipment which will remain should be hidden or protected. International staff families should be considered for an early departure Potential evacuees should assemble personal belongings to be taken during an evacuation, including: Passport and visa Drivers licence and other identification Extra cash XE "Cash"  (convertible currency) Hand-held radio with extra batteries Contact list Any medical essentials Torch/flashlight with extra batteries One bag of personal belongings not exceeding 15 kg Potential evacuees should ensure that they do not take with them any information or equipment that might be interpreted as incriminating (e.g. reports of military movements; pictures on disk or paper of any security-related subjects) Stock the assembly area with appropriate supplies, including the following: Food Water Candles and matches Toilet and related supplies Power source Communications equipment Torches/flashlights Cooking equipment Reading material Spare fuel for vehicles Assign each evacuee to a specific vehicle so that anyone missing may be readily identified, and ensure that all vehicles are ready PHASE THREE - EVACUATION IMMINENT The field office usually suspends the majority of normal operations to concentrate on evacuation preparations. Potential evacuees may be relocated to a pre-selected staging or safe area. Remote staff may be recalled or relocated. Staff currently outside the region should remain in a safe place. Non-essential personnel and family members may be evacuated. Tasks during this phase, which may last weeks or only a few hours, include: Keep all staff fully informed. Coordinate closely with embassies, other NGOs, the UN, and other agencies as appropriate Pay salaries to local staff, with salary advances if possible Hide high-value property which will remain. Options may include distributing among trusted staff if it will not put them at unacceptable risk; hiding in roof spaces; or burying. Remove logos from vehicles which may be stolen. Ensure you keep copies of serial numbers of high-value equipment. Give clear instructions regarding responsibilities and leadership roles to those staff staying behind. Establish a means of continued communication between remaining staff and those evacuating. Provide authorisation documents to key national staff, XE "National staff: evacuation"  if necessary. PHASE FOUR - EVACUATION Once evacuation or relocation has begun, it should take precedence over all other activities. The field office may continue operations through national staff, or contractors if appropriate, or may close completely. Considerations during evacuation may include: If there is a risk of looting XE "Looting" , consider disabling radios, equipment and vehicles. Empty and leave open all safes. Ensure effective communication with national staff left behind All evacuees move to pre-designated assembly area Evacuate by the safest means possible, maintaining good order and remaining in communication with all groups evacuating Keep in contact with key national staff, XE "National staff: evacuation"  as far as possible Once evacuation is complete, inform HQ, relevant embassies XE "Embassies" , and key national staff The evacuated personnel may manage operations from outside the country, communicating with and working through the national staff (or contractors) if possible. If a decision is made to close the office completely, care will be needed to ensure humane and correct termination or reassignment of staff contracts and the disposal of assets. SPECIAL CONSIDERATIONS DURING EVACUATION An evacuation is not easy for the evacuees or for those staying behind. It is a very emotional event, giving rise to feelings of guilt, hurt, frustration, and powerlessness. The departure of international aid agencies can have a variety of meanings to the local population XE "Local population" , including the removal of a symbolic or real safety barrier. Thus, an evacuation is not a neutral act and may even aggravate a crisis. When a field team evacuates it should consider providing a statement for the media and others explaining the organisations reasoning and any continuation or possible resumption of programmes. Self-evacuation. Individuals that are working remotely from a local office, or who find themselves isolated during a crisis should use their judgement concerning the safety in their area. All staff members should be authorised to evacuate on their own authority, in accordance with established criteria and procedures, when they feel their safety is threatened. Every effort should be made to communicate with their manager during the process, and once in a safe area the individual must contact their manager or HQ immediately. No one may re-enter an area after evacuation without specific authorization from their team leader. Evacuation refusal. Staff who are instructed to evacuate or relocate, and who refuse, may face disciplinary action including dismissal, depending on the policy of their employer. They are likely be considered as staying at their own risk, with their employer taking no further responsibility for their safety. National staff evacuation XE "National staff"  or relocation. Most humanitarian organisations have a policy of only evacuating international staff. If the field manager believes that some or all national staff and/or their families face a direct threat, then they may be obliged to consider organising or assisting their evacuation or relocation. Return and resumption of activities. This may occur soon after evacuation or take a long time. Re-establishing operations after an evacuation can be difficult. National staff who did not evacuate may have experienced hardship and threats to themselves and their families. They may resent this. Restoring relationships with staff, local authorities, beneficiaries, and the local population can be made easier if honesty, tact, and transparency are used prior to and during the evacuation, and on return. Financial security Robust financial procedures are vital. Without them, fraud or theft XE "Theft"  are much more likely. If theft occurs, not only does the field operation suffer but there can be an increased risk of violence to staff, since thieves may use violence. All humanitarian operations should include a manager able to manage financial procedures in the field, and to ensure financial security. He or she should be equipped with strong financial procedures, and trained in their use. Good financial management is a large subject, beyond the scope of this Guide. Detailed advice on financial procedures, including simple guides to NGO accounting XE "Financial security" , can be found at  HYPERLINK "http://www.mango.org.uk" www.mango.org.uk. All field managers should be aware of the basics of good financial security. Points that they should watch out for include: A properly trained and briefed bookkeeper, accountant XE "Financial security: need for accountant from outset"  or financial manager, appropriate to the size and type of programme, should be present from the start, including during the planning of the operation Minimise the amount XE "Cash"  of cash held in the office, or carried by any staff member Reduce the use of cash to a minimum, preferring bank XE "Bank"  transfers or cheques where possible Require receipts for all cash movements in or out, however small. Ensure that all staff know the procedure, and understand the reasons for it. Take disciplinary action against any who do not follow it. Establish strict procedures for authorising expenditure, in accordance with the organisations financial policy, and for depositing or withdrawing money from the bank XE "Bank"  or safe. Ensure that there is correct separation of duties, as required by normal financial good practice. For example, different people should be responsible for ordering, receiving and paying for goods. Maintain proper cash control, including regular and frequent cash and bank XE "Bank"  reconciliations Secure the safe(s) XE "Safe"  by bolting them to wall or floor; locking the room in which they are kept; and restricting access to the building Insist on regular audits XE "Audit"  If large sums of cash are required on certain days, for example pay day, consider reducing the risk of theft by: Bringing the cash from the bank XE "Bank"  on the day, rather than storing it overnight in the office Varying the time and route used to bring the cash from the bank XE "Bank"  Designating two or three staff members to withdraw the cash in two or three parts, bringing it to the office via different routes at different times Storing the cash in several different locations, so that not all the cash is lost if there is a theft Having more than one pay day per month, so that a smaller amount of cash is needed on each pay day Limit the amount of cash that can be carried by an individual Ensure that all staff know that they must not risk their lives to protect cash Staff should never talk or boast of their cash transfer experiences If large sums of cash have to be transported, ensure that the only people aware of this, including staff, are those who need to know, and who are trusted. If this is a frequent occurrence, vary the route, the timing and the method of travel XE "Travel: varying route and time"  so as not to create a predictable pattern. Procedures for changing money from one currency to another should be safe and legal Requests for money transfers should be kept confidential Beware of confidence tricksters. For example, check that someone claiming to represent an organisation to whom you are paying money, does in fact represent them. In general rushed financial transactions are more vulnerable to errors and fraud. Wherever possible, insist that all normal procedures are followed without exception. If there is a serious failure in financial security, leading to a significant theft or fraud, it is essential that the relevant staff particularly the relevant managers are held to account. It is difficult to hold them to account if they were never properly trained or equipped, which is one reason why good training and equipping are so important. Any significant theft or fraud should be reported. It should be investigated by a manager senior to, and independent from, the team in which the incident occurred. He or she should produce a written report stating the facts, as far as they can be discovered; assigning responsibility, as far as it can reasonably be assigned; and making recommendations for improvements to financial systems and disciplinary action, where appropriate. A procedure requiring such an investigation should be included in the financial manual XE "Manual (financial manual)"  of all humanitarian organisations. Failure to ensure full accountability in the event of a significant theft or fraud undermines the integrity of the organisation, and is likely to damage donor XE "Donors"  confidence. Fire safety Good fire safety XE "Fire safety"  precautions include: Assessing all buildings for fire safety Ensuring there are sufficient fire escape routes Emergency exits should have emergency exit keys, preferably glassed-in in a box, near to the exit but hidden from exterior view Designating fire assembly points outside all buildings Fitting smoke XE "Alarms"  alarms (smoke alarms are cheap about US$10 at the time of writing and are an effective way of saving lives). Accommodation buildings should normally have smoke detectors XE "Accommodation: fire precautions"  in all rooms except bathrooms and kitchens. Equipping buildings, and vehicles where necessary, with fire extinguishers Training staff in the use of fire extinguishers Rehearsing an evacuation of the building Ensuring all staff know the procedure for calling for help in a fire (bear in mind that there may be no fire brigade) Storing flammable materials correctly, and away from buildings Fire poses a significant risk to health and safety, especially in countries where there is no fire brigade, buildings are not built to minimize fire hazards, and few people have fire-safety training XE "Training: fire safety" . Fires in offices, warehouses, and residences can prove catastrophic and the threat of fire should be addressed in all safety and security assessments. Most fires start small and can be extinguished if detected early. The best method for fighting fires is prevention through regular inspections, staff training and properly maintained fire-fighting equipment in all facilities. IMMEDIATE ACTION FOR FIRE RESPONSE It is important not to panic when confronted with fire. There are many things that can be done to prevent a fire from spreading and minimize damage and potential loss of life. The steps to take are: Sound the alarm. Shout for help, summon aid, activate the fire alarm. Do not attempt to fight the fire until the building evacuation is initiated. Determine the cause of fire and what is available to fight it. If it is an electrical fire, it is important to first turn off electricity, if possible. Attempt to fight the fire but under no circumstances risk injury in the process If successful, continue monitoring the site to prevent flare-ups until help arrives If unable to fight the fire, evacuate quickly, closing doors and windows, if possible, ensuring no one remains in the building Give information to and cooperate with the fire brigade when they arrive FIRES IN BUILDINGS Fires in buildings can spread quickly, trapping people inside. It is important to respond immediately to any fire alarm or evacuation order. Do not assume it is a practice drill. Staff should plan ahead and learn the emergency exit routes from residences and offices. In hotels XE "Hotels security precautions"  or when travelling, look for the suggested evacuation route and rehearse it, if necessary. When evacuating a building remember the following: Think ahead what the route will look like smoke may obscure vision Do not take the lifts/elevators use the stairs Cover yourself with a non-synthetic blanket, coat or other cloth, preferably wet Before opening doors, feel the door for heat. There may be fire on the other side that will flare when the door is opened. Avoid routes that are exposed to falling objects Stay low and move as quickly as possible. It may be necessary to crawl to avoid smoke and heat. Jumping from more than two stories can be fatal and should only be a last resort. If unable to exit a tall building, make your way to the roof. Offices or residences should not be located in tall buildings that do not have adequate means of evacuation during emergencies. If in a burning building, it is important that evacuation is not delayed for any reason. Remaining inside should only be an option when there is absolutely no means to escape. If unable to exit, prepare to remain in the building by doing the following: Go to a room with an exterior window and mark it clearly to summon assistance. Stay in that room. Close the main entry door and any interior door to the room Place blankets and clothes at the base of the doors to keep smoke out. If possible, use wet cloth to make a better seal. If possible, wet non-synthetic blankets, coats or other clothes for possible use later Stay low near an open window and continue signalling for help. If fire spreads to the room, get under two or more layers of blankets or clothes with the outer layers wet, if possible IF A PERSON IS ON FIRE If you or someone near you is on fire, remember - stop, drop and roll. Stop. Dont panic and dont allow others to run about if they are on fire. Remove burning clothes, if possible. Drop. Fall quickly to the ground or floor. If someone else is on fire, try to get them to do so. Tackle them only if you will not catch fire yourself. Roll. Roll flat over and over (back and forth if in a room) until the fire is extinguished. The rolling will smother and scatter the fire in most cases. If someone else is on fire, have them roll. You can use water, sand, or a blanket to help smother the fire while they are rolling. Do not attempt to beat the fire out with bare hands; continue rolling instead. Once the fire is extinguished, summon help and begin first aid. Guards and private security companies Guards are necessary XE "Private security companies"  XE "Guards"  in many emergency relief situations. Humanitarian agencies have property that local criminals or armed groups, or simply hungry people, may wish to steal. There may also be risks to staff, who therefore need protecting. A strong and happy team of guards can be a major help to the smooth running of a relief operation. Poorly managed guards can lead to theft XE "Theft" , danger to staff, and extra burdens on managers. It is therefore worth investing time and effort to ensure that guards are managed well. Recruiting Recruiting good quality people is crucial to success. Do not take shortcuts: use the proper recruiting procedure. Insist on checking references XE "Recruitment"  before a new guard is allowed to start work. Make sure that the guards can speak the working language of the field team, so that all staff are able to communicate with them. It is good practice to agree pay scales for guards (and indeed other staff categories) with other relief organisations in the area, to avoid creating tension between guards working for different employers. Induction All guards should have a full induction, involving briefing, equipping, and training where necessary: Briefing Guards should be briefed clearly and thoroughly on their tasks. Do not assume that anything is obvious to them. Explain what the organisation does, and the values that it upholds. Describe the reputation that it wishes to have among local people. Make clear the importance of the guards, not only in protecting people and property but also in enabling the relief operation to help many others. Encourage them to feel part of the team. Detailed briefing points should include: Most of the normal induction points that other staff would receive Their routine duties Hours and shifts The importance of remaining at their post even if the guard due to take over from them does not appear How to communicate with their manager, and with other staff Action to take in the event of different types of incident How to deal with visitors XE "Visitors: instructions for guards"  The disciplinary system, and a warning that disciplinary action will be taken if a guard neglects his duties Guards should not risk their lives trying to protect property. Their role is to detect intrusion and to raise the alarm Equipping The appropriate equipment will vary according to the circumstances but may include the following: Identity card Torch/flashlight Whistle Aerosol fog horn or other loud alarm XE "Alarms"  Radio and spare battery Battery charger Watch Coat Stick (if justified by the threat; locally appropriate; and if your organisations policy allows it) Shelter Name badge Visitors book Recruiting a couple of dogs to accompany the guards can be a very effective deterrent to intruders, particularly in cultures where dogs are feared. Training Assess and provide XE "Training: guards"  for any training needs that the guards have. Radio voice procedure is likely to be one need. Rehearse with them the actions they should take in the case of the most serious security incidents such as armed robbery XE "Robbery" . Managing guards An experienced nationally-recruited staff member is likely to be the most appropriate line manager of the guards. He or she should keep a close eye on their performance, and should make random unannounced visits to check that all is well. In some situations it is almost standard practice for guards to sleep during the night. If this is the case, and if the security situation means that this would be dangerous, consider the following suggestions: Work out why they are falling asleep: for example, do they have a second job? Are their shifts too long? Do they have a long journey to and from work? Are they eating enough? Put two or more guards on duty overnight Appoint an overseer and hold him accountable for ensuring all guards stay awake Remove anything that could be used as a bed Summarily dismiss any guard found asleep on duty Shorten the length of shifts Visit guards unannounced in the middle of the night, so that they resist the temptation to go to sleep for fear of being caught Private security companies Many humanitarian organisations engage a local security company to provide guards. This is likely to be more expensive than employing guards directly. If the company is good, it can have several advantages including: Reduced administration: you do not need to recruit or manage guards Greater reliability: the company ensures that the guards are well trained and equipped, and turn up on time Replacement guards immediately available if one is sick or absent In many cases a quick reaction force is available, to respond to emergency calls (check whether the quick reaction team is armed, and if so, what you should do when you call them e.g. lie on the floor, stay away from windows, etc.) Flexibility: easy to increase or decrease the number of guards, as the needs of the operation change No need to make guards redundant at the end of the operation. It is vital to check the reputation and efficiency of a private security company before making an agreement. Are their procedures suitable for an organisation like yours? Will they use force only when necessary? Who is liable for harm done when they do? What kind of arms do they use? Is the company, or is any of its owners, connected to individuals or groups that you do not wish to be associated with? Are they honest? There can be disadvantages in using private security companies. They usually cost significantly more than employing your own guards, while paying their guards less than a humanitarian organisation would pay if employing them directly. Private security guards sometimes have no training for their role. Their presence can give the impression that a humanitarian organisation is cutting itself off from local people. In some cases the loyalty of their staff can be weak. Consider these and any other possible disadvantages before making your decision. Armed guards In a few extreme and exceptional cases, armed guards may be necessary and appropriate, if there is no other way to protect life and property adequately and if the humanitarian need justifies the continuation of the relief operation. Recent crises where most humanitarian organisations have used armed guards include Somalia and Chechnya. If some humanitarian organisations use armed guards but others do not, those that do not can become greater targets while those that do can become associated with an implied threat of violence, and with a greater isolation from the local community. In a few situations, it may look out of place not to have armed guards. If possible, all humanitarian organisations should reach the same decision on armed guards by consensus. They should consider how to minimise any negative local perceptions that might result. In each case where armed guards are used, organisations should have a clear policy on their use. In particular, instructions for opening fire should be very clear to all concerned. Management of armed guards needs to be especially strict, with severe penalties for misuse of weapons XE "Weapons" . Because of the risk of misuse of weapons XE "Weapons" , some humanitarian organisations prefer never to employ armed guards directly, but instead to engage a private security company to provide them. See the discussion on private security companies within this Annex. In some cases no security company is available, in which case the local police, military XE "Police: local"  or paramilitary authority may provide them. If so, the question may arise whether they should be paid. There are differing views on this: some say they may need to be paid, particularly if they receive no salary and their commitment needs to be assured. Others say that any payment to police, military or paramilitary XE "Civil-military relations"  guards compromises independence, and/or may become a protection racket. The best answer will depend on the situation and the judgement of an experienced manager. It is vital that the organisation supplying armed guards is reputable and reliable, and perceived as so among the local population. Check whether the organisation is connected to individuals or groups that you do not wish to be associated with. In all cases, a senior manager at HQ should take the decision whether to deploy armed guards, and should do so having consulted with any other humanitarian organisations working in the same area. Before making the decision, managers must be convinced that armed guards will reduce rather than increase the risks to the organisation. Other issues to consider include: Checking that the guards are capable of doing their job Strict discipline, including a ban on the use of drugs or alcohol What happens if and when the need for armed protection ends? What happens if a guard injures or kills someone? Health and hygiene Healthy staff XE "Medical: health and hygiene"  XE "Hygiene"  tend to be more efficient, alert and safe. Common illnesses among humanitarian staff include potentially fatal infections such as malaria. It is vital that humanitarian staff take good care of their health, and are rigorous about hygiene and other preventive measures. All staff should normally undergo a medical examination before signing their contract. They should also undergo a medical examination after completing their contract. This both ensures that any medical problems can be dealt with, and helps to protect the organisation from false claims concerning medical problems resulting from the employment. It can also result in lower insurance premiums. Staff should take qualified medical advice on health and hygiene precautions. Some of the most common are: Health precautions Malaria precautions are essential, in areas where malaria is a risk. Malaria can kill, and often does. Take care to prevent mosquito bites. Precautions against malaria include: Wear long sleeves, trousers and socks in the late afternoon and evening, to prevent bites Wear insect repellent on any exposed areas of skin Use a mosquito net correctly when sleeping Burn anti-mosquito coils or tablets to kill mosquitoes inside buildings Fit anti-mosquito netting to doors and windows Take the appropriate malaria prophylaxis, on the advice of your doctor Site buildings away from mosquito-breeding areas Vaccinations against serious diseases. Some countries do not admit foreigners without a certificate of vaccination. Verify the quality and capacity of local medical facilities. Ensure that all staff are aware of which medical facilities can be trusted, and their locations. A medical NGO may be able to provide emergency cover. First aid kits should be available XE "First aid: kits"  in each building and vehicle, and may need to be carried by staff. It is important that first aid kits are appropriate to the situation and kept up to date by a qualified person. Precautions against HIV/AIDS XE "HIV/AIDS" , including: Availability of clean needles and syringes for medical purposes Appropriate and responsible sexual behaviour Protection against the sun. Wear a hat, long sleeves and long trousers or skirt, and use sun protection cream. Avoid dehydration: drink enough. Carry a water bottle if necessary. Hygiene precautions Clean water supply. If clean water is not guaranteed, filter water and boil for 5 minutes to make it safe for drinking. Keep a spare stock of water in case of failure of supply Keep a stock of water purification tablets Ensure food is sourced and prepared correctly Wash hands frequently, and before meals Ensure cooks wash their hands frequently while preparing meals Ensure kitchen, washing and latrine areas are kept clean Dispose of rubbish effectively Avoid eating fruit or vegetables that have not been thoroughly washed in clean water First aid precautions It is advisable for humanitarian organisations to have a policy on first aid, including: What level of first aid training should XE "Training: first aid"  be required in field teams Which field staff should have first aid training What type of first XE "Accommodation: first aid kits"  aid kits should be held as standard procedure in: Accommodation buildings Offices Warehouses Vehicles For advice on health, hygiene, first aid or any medical matter, always consult your doctor. Further information is available from: World Health Organisation: see the section on International Travel and Health at  HYPERLINK "http://www.who.int/ith" www.who.int/ith Helpful travel health information website from the UK National Health Service, at  HYPERLINK "http://www.fitfortravel.nhs.uk" www.fitfortravel.nhs.uk - see particularly the A to Z Index there Travellers Health: How to stay healthy abroad, a book edited by Dr Richard Dawood The Travellers Good Health Guide, a book by Dr Ted Lankester. Aimed particularly at aid workers and others planning an extended trip overseas. Includes information on preparation, precautions, treatment and reverse culture shock on returning home. Information security Information security is ensuring that important information is not lost, and that confidential information remains confidential. Filing system An efficient filing system is essential. Without it, information will be lost, and will require considerable time and effort to find or re-create. Security of files Files should be kept in rooms not accessible to the public. Sensitive or confidential files should be clearly marked as such, and kept in unmarked, locked filing cabinets. Backing up files Any files whose loss would be costly or damaging should be copied (backed up), and the copies kept at a different location from the originals. It may be necessary to send the copies to HQ for safekeeping. Such files might include financial information, personnel files, and any files which will be required for reports to donors. Files for evacuation If evacuation is a possibility, a list should be made of the files which should be taken with the team when evacuating. In this way, the necessary files can be gathered quickly when the evacuation is decided on. Such files may include personnel files, financial files and inventories of equipment or stock, for example. Note that it may be dangerous to take certain types of information with the team when evacuating, as the team may be searched when attempting to leave the area. There have been instances of humanitarian staff being arrested, tried and imprisoned for long jail terms because they were found to be in possession of sensitive information XE "Sensitive information" , while evacuating. It is wise to prepare a draft authorisation document, which can be rapidly signed in the event of evacuation, giving authority to the senior national staff XE "National staff: evacuation"  member to represent the organisation and to manage its operations. Computer security XE "Computer security"  Information held on a computer is vulnerable to damage and theft, even if passwords are used. Files remain on computer disks and can be read, even once they appear to have been deleted. Disk corruption, viruses and other types of computer attack can damage or remove information. Managers should ensure that all staff using computers regularly back up important information held on computers. Back-up disks should be held in a different location. All computers should if possible be locked to a fixed point, to make theft more difficult. Radio, telephone and e-mail security All radio and XE "Radio procedures"  telephone conversations, and all fax and e-mail, can be listened to or read by others, even if encryption is used. There is no such thing as a totally secure encryption system. That said, some encryption systems are very good, so that it would require a highly trained specialist, and considerable time, to decode a message. Satellite phones XE "Satellite phones"  are also not secure. There have been instances of military forces apparently discovering the locations of refugees by listening to the satellite phone conversations of humanitarian managers who thought they were talking on a secure system. The military then went to the refugees location and killed them. The simple way to avoid giving away sensitive or confidential information is not to send it. It is often possible to take the information in person, and communicate it directly to the person who needs to know it. This may take longer, but is it essential that that person knows the information quickly? It may sometimes be unavoidable to send sensitive or confidential information. In these cases, be aware of the risks (to you and others, including local people) and weigh them against the benefits. Many experienced humanitarian managers strongly advise against the use of encryption by humanitarian organisations. In some countries, a licence is required by organisations using encryption. Although some encryption systems are very good, there is no such thing as 100% secure communications. In the case of encrypted e-mail, the computers which send and receive messages contain decoded versions of the messages: if the computers are seized, those messages can be read. A further argument against encryption is that its use may be likely to attract attention from intelligence agencies who may wonder why encryption is necessary. Aid workers have been imprisoned in the past when their computers or documents were found to contain sensitive information XE "Sensitive information" . Sending non-encrypted messages, with no highly sensitive content, helps to avoid this potentially serious problem. Information that should not be recorded Humanitarian organisations should avoid recording any sensitive information XE "Sensitive information"  that they do not need to record. In particular, they should not record any information that might give the impression that they are spying, or gathering information that might compromise the security of a local authority or a party to a conflict. For example, humanitarian organisations need to know the general security situation around them, and the threat (if XE "Threat: threats from military forces"  any) posed by military forces. But they probably do not need to know or record the precise locations of troops, trenches, heavy weapons, and current military operations unless they are threatening an area where humanitarian staff are working. (An evacuation from that area is then likely to be necessary.) Recording inappropriately detailed military information can put the organisation at great risk. If found with such information its staff could be attacked or imprisoned on suspicion of spying. Insurance for war risks Many humanitarian organisations find it necessary XE "War risks insurance"  XE "Insurance"  to obtain war risks insurance for field staff working in insecure locations. This is similar to travel insurance in the benefits that it can pay out, but unlike normal insurance does not exclude risks arising from conflict. It can be hard to find war risks insurance at a reasonable price. It is vital to check the wording of any policy very carefully before buying it. Are any risks excluded? Are any countries excluded? Is the level of benefits sufficient? Are any other conditions imposed? Contact other experienced humanitarian organisations and ask them which insurers they use. Benefits to consider include compensation for: Medical costs Repatriation costs, in the case of illness or injury Repatriation of mortal remains, in the event of death Temporary partial disability Temporary total disability Permanent partial disability Permanent total disability Loss of life Employee replacement costs Personal or organisational liability Loss of property Are dependants covered? Exclusions that an insurer may seek to impose include: Cover only during work assignment (possibly excluding time on holiday, or time on Rest and Recreation (R&R), or time away from the duty station) Cover only during working hours Cover excluding war zones (check the definition of war zone) Cover only if the organisation has written security guidelines, or if they are enforced, of if they were being followed at the time of the incident Cover only if the organisation provides security training for all XE "Training: insurance requirements"  staff without exception Cover only for the duration of the contract (so, what happens if effects of an incident appear after the end of the contract?) Staff should check to see if other personal or corporate insurance currently in force may be invalidated by travelling to a high-risk area. Sometimes life insurance policies or policies connected with a mortgage, among others, can be invalidated in this way. Both national staff XE "National staff: insurance"  and international staff should be insured, if the organisation is not able to self-insure. The level of benefits should be set by a clearly thought-through policy that staff see as fair. All staff should receive a copy of the insurance policy, and understand its meaning and the level of benefits provided. Note that failure to maintain adequate insurance could lead to large claims being made against an employer, which in some cases could drive the employer into bankruptcy. Some insurance companies will offer significantly lower premiums if those covered have received proper security training. For further information, see Under Cover? Insurance for Aid Workers, a report produced for People In Aid. International Humanitarian Law (IHL) International Humanitarian Law (IHL) is the body of rules XE "International Humanitarian Law"  which, in wartime, protects people who are not or who are no longer participating in the hostilities. Its central purpose is to limit and prevent human suffering in times of armed conflict. International humanitarian law covers two areas: The protection of those who are not, or no longer, taking part in fighting Restrictions on the means of warfare in particular weapons XE "Weapons"  and the methods of warfare, such as military tactics. A major part of international humanitarian law is contained in the four Geneva Conventions of 1949. Nearly every State in the world has agreed to be bound by them. The Conventions have been developed and supplemented by two further agreements: the Additional Protocols of 1977 relating to the protection of victims of armed conflicts. These documents can be found at ( HYPERLINK "http://www.icrc.org/eng/ihl" www.icrc.org/eng/ihl). Other agreements prohibit the use of certain weapons and military tactics and protect certain categories of people and goods. These agreements include: The 1954 Convention for the Protection of Cultural Property in the Event of Armed Conflict, plus its two protocols  HYPERLINK "http://portal.unesco.org/culture/en/ev.php-URL_ID=8450&URL_DO=DO_TOPIC&URL_SECTION=201.html" http://portal.unesco.org/culture/en/ev.php-URL_ID=8450&URL_DO=DO_TOPIC&URL_SECTION=201.html The 1972 Biological Weapons Convention  HYPERLINK "http://www.unog.ch/disarm/distreat/bac_72.htm" http://www.unog.ch/disarm/distreat/bac_72.htm The 1980 Conventional Weapons Convention and its four protocols  HYPERLINK "http://www.un.org/millennium/law/xxvi-18-19.htm" http://www.un.org/millennium/law/xxvi-18-19.htm The 1993 Chemical Weapons Convention  HYPERLINK "http://disarmament.un.org:8080/TreatyStatus.nsf" http://disarmament.un.org:8080/TreatyStatus.nsf The 1997 Ottawa XE "Mines"  Convention (on anti-personnel mines)  HYPERLINK "http://www.un.org/Depts/mine/UNDocs/ban_trty.htm" www.un.org/Depts/mine/UNDocs/ban_trty.htm The 2000 Optional Protocol to the Convention on the Rights of the Child on the involvement of children in armed conflict  HYPERLINK "http://www.unhchr.ch/html/menu2/6/protocolchild.htm" www.unhchr.ch/html/menu2/6/protocolchild.htm (If any of the above web addresses become unworkable, use a search engine to find the document you need.) International humanitarian law applies only to armed conflict; it does not cover internal tensions or disturbances such as isolated acts of violence. The law applies only once a conflict has begun, and then equally to all sides regardless of who started the fighting. If not all the parties have ratified the Geneva Conventions, Customary Law still applies, with similar effect - the ICRC can advise on this if necessary. For example, the principle of non-refoulement XE "Refoulement"  (refoulement is the forcible return of people to countries where they face persecution) is part of customary international law and is binding on all states. Therefore no government should expel a person in those circumstances. The International Committee of the Red Cross (ICRC) has been appointed XE "International Committee of the Red Cross (ICRC)"  by the international community as the promoter and guardian of IHL. The ICRC is ready to assist if there are questions about IHL or its application. It gives a large amount of useful information on IHL on its website at  HYPERLINK "http://www.icrc.org" www.icrc.org. Humanitarian managers should have at least a basic familiarity with key provisions of IHL, for several reasons including security. For example: If an armed group is threatening or attacking humanitarian staff, after taking any necessary immediate action to secure their staff, humanitarian managers may think it appropriate to remind the armed group of their responsibilities under IHL, including their responsibility not to threaten or attack humanitarian staff. Normally the ICRC will remind all relevant authorities of this, but in some cases the ICRC may not be present, or it may be necessary to apply further pressure. Diplomatic channels may also be used to bring pressure to bear, provided that they do not compromise the impartiality (real and perceived) of humanitarian organisations. If anti-personnel mines are being laid XE "Mines" , humanitarian managers should be aware that they are illegal, and if it is safe to do so should report the fact to ICRC or another appropriate body If child soldiers are in evidence, perhaps posing a threat to humanitarian organisations, humanitarian managers should consider discussing the issue with the ICRC or Unicef who may be able to take appropriate action Reporting a breach of IHL, or a war crime XE "War crimes: reporting"  or a serious human rights abuse XE "Human rights abuses" , may place the organisation and its staff in danger. Yet if crimes are committed with impunity, insecurity usually increases. It may be necessary to report confidentially, in such a way that the source of the information is never identified or guessed by potentially hostile groups. For further information on IHL, see the ICRC brochure: International Humanitarian Law: Answers to your Questions, available on the ICRC website at  HYPERLINK "http://www.icrc.org" www.icrc.org. Other organisations involved in the promotion of IHL include: United Nations High Commissioner for Human Rights  HYPERLINK "http://www.unhchr.ch" www XE "United Nations High Commissioner for Human Rights (UNHCHR)" .unhchr.ch Human Rights Watch XE "Human Rights Watch"   HYPERLINK "http://www.hrw.org" www.hrw.org Amnesty International XE "Amnesty International"   HYPERLINK "http://www.amnesty.org" www.amnesty.org UN Human Rights Treaties (not the same thing as IHL), together with relevant explanation and a description of remedial mechanisms are made available at  HYPERLINK "http://www.bayefsky.com" www.bayefsky.com. Inventory control Theft and loss of XE "Theft"  goods XE "Inventory control"  are common problems in humanitarian operations. When large quantities of goods are moving rapidly through an area in crisis, it is inevitable that some theft and loss occurs. But the scale of theft can be greatly reduced by good management, and particularly by inventory control procedures. All goods and property should be logged in an inventory. A staff member should be assigned responsibility for establishing and maintaining the inventory. There may be a need for more than one inventory for example, one for the organisations equipment, and another for goods in the warehouse. It is vital that inventories are kept fully accurate and up to date, from the outset of the operation. Indeed, it is at the outset that many losses tend to occur, because of the greater confusion that is usually present. The principles are simple (although in a fast-moving situation it can be hard to keep up). All incoming goods or equipment should be signed for using a receipt form, and then entered on the inventory. All outgoing goods or equipment should be signed for using a despatch form, and removed from the inventory. When an item of equipment is issued to a staff member for his or her use, he or she should sign for it on an issue form. When the equipment is returned, the person receiving the returned equipment should sign to acknowledge its receipt, in a separate column on the issue form. In a warehouse, once goods have been received and placed in the inventory, they are normally also allocated to a particular stack of goods. Each stack has a stack card, on which the goods should also be recorded when they arrive or leave. The names of the forms may vary between organisations, but the basic principles remain the same. Without a system of this kind, used by all staff in a disciplined manner, there is a much higher risk of theft, loss and inefficiency. A manager should regularly check that the inventory control system is functioning properly. Frequent checks may be needed at the start of an operation, as systems get up and running. Checks should include unannounced visits, and random verification of goods or equipment and their related paperwork. Any significant theft or loss should be reported. It should be investigated by a manager senior to, and independent from, the team in which the incident occurred. He or she should produce a written report stating the facts, as far as they can be discovered; assigning responsibility, as far as it can reasonably be assigned; and making recommendations for improvements to inventory control systems and disciplinary action, where appropriate. A requirement for such an investigation should be included in the logistics procedures of all humanitarian organisations. Failure to ensure full accountability in the event of a significant theft or loss undermines the integrity of the organisation, and is likely to damage donor XE "Donors"  confidence. Media and security The media can sometimes XE "Media"  have an impact on the security of humanitarian staff. By reporting details of a sensitive operation they may arouse the anger of groups who wish to see the operation stopped. They may attract the attention of hostile armed forces. They may simply alert criminals to the presence of high-value goods to steal. On the positive side, the media can enhance security by reporting accurate information about a humanitarian operation, winning local goodwill. After a security incident, the media can be used to disseminate accurate reports, thus squashing exaggerated rumours that may be circulating. Humanitarian managers should therefore be aware of media reporting, and able to use the media effectively when appropriate. Points to bear in mind may include: Know what message you want to get across, and ensure that you do so during the interview. Be able to express it briefly and clearly. In the Western media, expressing your message in a sound bite of 8 seconds or less greatly increases the chances of it being broadcast. Ensure that you always tell the truth. This is right in principle, and wise in practice. It builds up a reputation for honesty, and false information is usually found out in the end. If you are not sure of a fact, dont publish it. If you dont know the answer to a question, say you dont know. If you have to publish unconfirmed information, state clearly that it is unconfirmed. After a major security incident, consider making an early statement to the media as soon as you have some confirmed facts to tell them. This will help to prevent false rumours from growing. It is not usually a good idea to say no comment to a question from the media. This looks defensive, and leaves an information gap that they may try to fill with less reliable information. If you become aware of a false rumour concerning your organisation, consider how best to correct it. Assess whether it could become the cause of an increased threat to XE "Threat: threats caused by rumours"  your organisation if it is left uncorrected. Give clear instructions to your staff as to who may speak to the media, and who may not. For those who are not to speak to the media, explain to them the reason for it (e.g. it helps prevent confusion if there is only one spokesperson), and let them know what they should say if approached by the media (e.g. politely refer them to the spokesperson). In general, openness works better than a defensive attitude towards the media. They have a legitimate job to do, and they can help your operation. An ideal working relationship will be respectful, professional and open but not too familiar, since the media may be tempted to take advantage of too close a relationship. Remain aware of what the local media are saying. If they use a language which you do not speak, nominate a colleague who does speak the language, to monitor the media and to summarise it to you. This enhances your understanding of the local situation, and enables you to assess the evolving security environment. Avoid commenting on the government, political or military situation unless there are overriding reasons to do so Medical evacuation (Medevac) A humanitarian organisations security plan should detail XE "Medical: evacuation (Medevac)"  the procedure for medical evacuation XE "Medical: emergency"  (Medevac). If the organisation has contracted a medical evacuation company (usually in conjunction with an insurance policy), then the procedure agreed with that company will apply. Typical requirements include: A doctor who has examined the patient must sign a certificate stating that Medevac is necessary. This certificate must be faxed to the insurance company. All staff must know the procedure for calling in the medical evacuation company, including up to date phone and fax numbers, and certificate numbers if necessary There should be clarity as to which staff are entitled to Medevac, and what medical arrangements are available for any staff who are not entitled to Medevac It is a good idea to telephone the number for the medical evacuation company when you are setting up your programme, to check that you have the correct number and to verify that they recognise you as a client. Medevac routes should be checked. Will the roads you intend to use be open if there is a deterioration in the security situation? What alternative routes are there? Will the local airfield or airport be open, accessible, and secure? What alternative airfields are there? A medical NGO operating in the same area may be able to help during medical emergencies. Discuss this possibility with them before an emergency arises. Next of Kin records A Next of Kin record enables XE "Next of Kin: Next of Kin records"  an organisation to inform a staff members family or close friends, in the event of an accident, injury, illness or death. An up to date Next of Kin record of all staff (both nationally-recruited and international) should be held at all times at HQ or in the field: preferably in both locations in case records at one location are lost. A Next of Kin record is likely to contain at least the following information: Staff Member Full name of staff member Date of birth of staff member Home address and telephone numbers of staff member Next of Kin Full name of Next of Kin Relationship to staff member (e.g. father, wife, friend, etc) Address Telephone numbers E-mail address If this person cannot be contacted, is there another person who should be contacted? If so, provide full name, their relationship to you, and full contact details. Next of Kin: procedure for informing them If an accident XE "Next of Kin: informing Next of Kin" , injury, illness, death or other serious event happens to a staff member, and if that person is unable to contact their Next of Kin, in most cases the employing organisation has at least a moral duty to inform them. This is obviously a very sensitive process, and it is important to have a clear procedure for it. The procedure is likely to include at least the following points: Who should inform the Next of Kin? In serious cases such as death, it should usually be a senior manager who informs the Next of Kin, to show the importance that the organisation attaches to the event, and to supporting the family and friends of the staff member. By what means should the Next of Kin be informed? If the staff member has died or is seriously ill, a personal visit is likely to be essential. In some cases, for example where the Next of Kin lives in another country, a rapid personal visit may not be possible, in which case a senior manager should decide whether a telephone call is appropriate. Advice to those who have to communicate the news to the Next of Kin Communicating with Next of Kin The following tips may be helpful: If you do not speak the same language, ensure that a good interpreter is available, and consider whether a colleague who does speak the same language would be more appropriate to break the news (If visiting) Dress respectfully. If the Next of Kin is a woman, ensure that the visit is by a woman, or if there is more than one visitor, at least one of them is a woman and vice versa. (If telephoning) Ask the person if they are alone. If they are not, request that they go to a room where they can be alone. (If visiting or telephoning) In the case of death or other serious event, you may wish to have a trained counsellor take part in the visit or call Say that you have some bad news. Invite them to sit down. Look at them directly (if visiting). Tell them simply and clearly what has happened to the person concerned. For example, I am very sorry to say that John is dead. This is usually far better than a longwinded sentence, or delaying the moment when they hear the bad news. They have probably guessed it already. At this point, be prepared to offer support to the person. Their reaction may take many different forms, ranging from silence all the way through to hysterical grief or even violence. What is important is that you remain calm, supportive, sympathetic and gentle. Depending on their mood, a physical sign of support may be appropriate, from someone of the same gender: for example, an arm round the shoulder. It is helpful if you come with a supply of handkerchiefs. If and when they wish to hear the whole story, tell it simply and clearly, preparing to pause if they cannot hear any more Use your judgement as to whether it is appropriate to tell them a long version of the story, or a shorter version. A shorter version inevitably is more selective, but it may be all that they can cope with at this stage. Make sure that everything you say is truthful. If you dont know the answer to a question, say that you dont know. It can be very damaging for relatives to discover later that they were misled, whether intentionally or unintentionally. Once they understand the situation and are calm enough to think of practical matters, inform them what action the organisation has taken (e.g. taken the injured person to hospital; recovered the dead persons body, etc). Suggest what action they might wish to take (e.g. fly out to see the injured person). Say what help the organisation will give (e.g. pay for airfare; ensure that any insurance payment happens rapidly but check that you only give totally accurate information on financial matters, and make no promises that you cannot keep). Take plenty of time to reassure them as much as possible. Ask if they have family or friends who can provide emotional support, and offer to contact them on their behalf If they need you to stay for a long time, be prepared to do so. If the news is of a death, they should not normally be left alone; instead, wait until a friend or family member has arrived to support them. Once they are ready for you to leave, express your sympathy again, and reassure them that you will help in every way possible. Give them your name and full contact details. Give them the name and contact details (including evenings and weekends) of the person who will be their main contact within the organisation (if it is not you). Ensure that you (or the main contact person) contacts the Next of Kin the next day, and as frequently as appropriate thereafter. Organisations sometimes find it easier to offer immediate support, but harder to remember the ongoing support that is vital both for the good of the Next of Kin, and for the reputation of the organisation. The family of a dead staff member is likely to make severe criticism of any employer who appears to forget them. Verify what financial and other help is due from the organisation, or from an insurance company, to the Next of Kin. Ensure that this is communicated with total accuracy, and without delay, to the Next of Kin. Arrange for this help to arrive as soon as possible. A senior manager should remain in charge of the whole process, to ensure that high standards are maintained People In Aid Code: Principle Seven Principle 7 of XE "People In Aid Code"  the People In Aid Code of Good Practice in the management and support of aid personnel is entitled: Health, Safety and Security. It states: The security, good health and safety of our staff are a prime responsibility of our organisation. We recognise that the work of relief and development agencies often places great demands on staff in conditions of complexity and risk. We have a duty of care to ensure the physical and emotional well-being of our staff before, during and on completion of their period of work with us. The following indicators are attached to the principle, to assist aid agencies in assessing how well they measure up to it. They are: Written policies are available to staff on security, individual health, care and support, health and safety. Programme plans include written assessment of security, travel and health risks specific to the country or region, reviewed at appropriate intervals. Before an international assignment all staff receive health clearance. In addition they and accompanying dependents receive verbal and written briefing on all risks relevant to the role to be undertaken, and the measures in place to mitigate those risks, including insurance. Agency obligations and individual responsibilities in relation to possible risks are clearly communicated. Briefings are updated when new equipment, procedures or risks are identified. Security plans, with evacuation procedures, are reviewed regularly. Records are maintained XE "Accidents"  of work-related injuries, sickness, accidents and fatalities, and are monitored to help assess and reduce future risk to staff. Workplans do not require more hours work than are set out in individual contracts. Time off and leave periods, based on written policies, are mandatory. All staff have a debriefing or exit XE "Debriefing: after end of contract"  interview at the end of any contract or assignment. Health checks, personal counselling and careers advice are available. Managers are trained to ensure these services are provided. In the case of staff on emergency rosters, managers should ensure that health clearance, immunisations and procedures for obtaining the correct prophylaxes and other essential supplies are arranged well in advance. Radio procedures Radios should only XE "Telecommunications"  XE "Radio procedures"  be used if they are necessary: in some situations other methods of communication are sufficient. It takes time to learn to use a radio well. All staff should be taught basic radio use as an essential aid to security, in those field operations where radios are necessary. Types of radio Long-range radios are High Frequency (HF) radios, which can communicate several hundred kilometres and in some circumstances several thousand. Short-range radios are usually Very High Frequency (VHF) radios. They can usually communicate a few kilometres directly, but using a repeater station (on a hilltop or a high building) can sometimes communicate several tens of kilometres. Typical ranges for VHF radios are: Handheld to handheld: 2 5 km Vehicle unit to vehicle unit: up to 20 km Base unit to handheld: up to 15 km Base unit to vehicle unit: up to 30 km Base unit to base unit: up to 50 km Some VHF radios are hand-held, with a small antenna: these are often carried by humanitarian staff. Larger radios, either VHF or HF, are mounted in vehicles or in buildings, with larger antennas. Care of a radio A radio battery needs to be recharged regularly. Some kinds of batteries should be fully discharged before they are recharged, or the life and power of the battery will be reduced. It is good practice to carry a spare battery, fully charged, to enable an immediate change of batteries when the first one runs out. Radios are expensive items, attractive to thieves and to unscrupulous soldiers. All staff should sign for receipt of their radio and be warned to keep it with them at all times. Programming radios Many modern radios need to be programmed before they can be used. A technician will normally do this. The radio is tuned to the frequencies in use by humanitarian organisations in that area, plus one or more frequencies specific to your organisation. Often, humanitarian organisations will share one or more radio channels. A UN agency may make available two or more of its channels, for use by all humanitarian organisations. If so, one channel is likely to be designated as the calling channel, and another may be designated as the security or emergency channel. Procedure for speaking on the radio It is important to follow the standard procedure for speaking on the radio. Only one person can speak at one time, and while doing so he or she prevents anyone else from speaking. Unlike a telephone, anyone with another radio can hear what you are saying. Therefore bear in mind the following principles of radio use: Clarity Brevity XE "Communications security"  Security Do not use the radio like a telephone. Work out what you want to say before transmitting. The following procedure words (known as prowords) are some of those commonly used: ProwordMeaningHELLOI am calling (then insert the callsign of the person or station you are calling)CALLSIGNThe radio name of a person or station. (Usually composed of letters and numbers, e.g. A21 (pronounced Alpha Two One). Actual names of people or organisations are not used.)THIS ISMy callsign isI SAY AGAINI am repeating what I have just transmittedREAD BACKPlease read back this entire transmission exactly as you heard itROGERI understand what you have just saidSENDPlease send your messageOVERThis is the end of my transmission and I expect you to reply.OUTThis is the end of my transmission and I do not expect you to reply. (OVER AND OUT is never used.)WAITI must pause for a few seconds. Please wait. (Other users should not use the radio channel in the meantime.)WAIT OUTI must pause longer than a few seconds; I will call you back. (Other users can use the radio channel in the meantime.)CORRECTWhat you have just transmitted is correct.WRONGWhat you have just transmitted is incorrectCORRECTIONWhat I have just transmitted is incorrect and the correct version isBREAK BREAKThis is an emergency and I need to interrupt a radio conversation to send my message. Calling another person Ensure no one else is transmitting at the same time. Wait for ongoing discussions to finish completely before beginning transmission. Make your message brief but precise Use the standard procedure words Use call signs instead of personal names. Do not identify organisations or personnel by name over the radio. Begin by pressing the transmit button and saying: Hello [their callsign] this is [your callsign] over. Then release the transmit button immediately. After they respond (perhaps by saying [Their callsign], send over), you press the transmit button, say your callsign again, send your message, and end with over or out. Release the transmit button. After the initial call in a conversation, it is normal for each transmission to begin with the callsign of the person speaking, but in some cases this is not necessary. Local practice varies. Break the message into sensible passages with clear pauses between Maintain clear speech with normal rhythm and moderate volume Hold the microphone approximately 5 cm from your mouth Avoid excessive calling. Use radios for work-related purposes only. Never transmit specific security-related information or travel plans or discuss transfer of cash or goods XE "Cash"  Phonetic alphabet When spelling XE "Phonetic alphabet"  letters on the radio, or using letters in callsigns, the international phonetic alphabet is used. All radio users should know this alphabet by heart: A ALFA B BRAVO C CHARLIE D DELTA E ECHO F FOXTROT G GOLF H HOTEL I INDIA J JULIET K KILO L LIMA M MIKE N NOVEMBER O OSCAR P PAPPA Q QUEBEC R ROMEO S SIERRA T TANGO U UNIFORM V VICTOR W WHISKY X X-RAY Y YANKEE Z ZULU Power supply Radios cannot operate without power. In most humanitarian situations, mains electricity supply is either non-existent or unreliable. Therefore you are likely to need a generator XE "Generators"  and a fuel supply for the generator, to power larger radios directly and to power battery chargers for battery-powered radios. Ensure you keep all your batteries fully charged so that, if an emergency occurs, all power fails and your generator XE "Generators"  breaks down, you can still communicate. Generators XE "Generators"  should be sited far enough away from offices XE "Accommodation: generators"  and accommodation to reduce the noise disturbance that they cause. If they can be housed in an outhouse with sufficient ventilation, or a wall built around them, so much the better. They are valuable, so secure them with strong locks and prevent public access to them. When using unreliable mains electricity or a generator XE "Generators" , electronic equipment can be damaged or destroyed by power surges. It is vital to connect a surge protector between the power supply and your radios, battery changers and computers. Generators XE "Generators"  need regular maintenance from a competent technician. In emergency The standard radio emergency call, primarily used for shipping or aircraft, is MAYDAY MAYDAY MAYDAY, followed by your callsign three times, followed by your location, a brief description of the emergency, and what assistance you need. In practice aid workers rarely use this procedure, but use plain language and/or an immediate incident report (see Annex 29). Duress XE "Duress codes"  codes Duress XE "Duress codes"  code words are generally innocuous words or phrases selected for use over the radio or telephone to indicate that the speaker is in a threatening situation but not free to communicate. All staff should be informed of the duress code word(s). Do Get trained in radio use before starting practising with a colleague can help Think before you speak Be very brief Only use a radio when there is no other suitable method of communication Know which is the calling channel and which is the emergency channel Dont Dont mention sensitive information XE "Sensitive information"  on the radio Dont touch an antenna when a radio is transmitting (there can be a risk of burns) Dont use a radio close to fuel when it is exposed to the air, for example when filling up a vehicle (there can be a risk of igniting fuel) Rest and Recreation (R&R) During a high-pressure operation XE "Rest and Recreation (R&R)" , staff are likely to need regular Rest and Recreation (R&R). Its purpose is to help prevent stress XE "Stress"  or illness, and to improve efficiency. R&R usually involves a staff member leaving the operation for a number of days, going to a location that is near enough to be inexpensive, but far enough from the operation to allow a sense of distance and freedom from pressure. The location for R&R should be as stress-free as reasonably possible. It should preferably be somewhere where the persons language is understood. Accommodation should be comfortable XE "Accommodation: R&R accommodation" , without being luxurious. Some staff will prefer to have company; others to be alone. How much R&R is needed will depend on the circumstances and the resources available. In the most serious phase of a major crisis, some organisations provide a weeks R&R every six weeks or so. In subsequent, less serious phases, the frequency may reduce to eight or twelve weeks, or longer. Once an R&R procedure has been decided for an operation, it is good practice for it to be mandatory. This is because the most motivated staff are likely not to take R&R if it is optional and this is likely to result in stress, illness or inefficiency. In the past, R&R has been almost only provided to international staff, on the grounds that they are working in a foreign country, away from their families and normal support structures. Yet in some circumstances, nationally-recruited staff may be under just as much pressure as international staff. In these cases, wise managers will consider what R&R is appropriate for nationally-recruited staff: because of the presence of their families it is likely to be a different format from international staff. For further information, see People In Aids Guidelines on Setting up a Policy on Rest and Relaxation, 2002, at  HYPERLINK "http://www.peopleinaid.org" www.peopleinaid.org. Security Assessment The aim of a security assessment XE "Security assessment"  is to understand the security situation sufficiently to enable the team to plan their security measures appropriately. The team leader normally carries out a security assessment before a final decision is taken to deploy, and certainly before the arrival of the main team. It is done preferably by an assessment visit and, where a visit is not possible, by remote assessment. A security assessment visit should be long enough to achieve its aim. Factors influencing the length of the visit include: The level of insecurity The experience of the person/people making the assessment The number of people making the assessment Geographical size of the area Complexity of the political situation Weather Other local events, e.g. holidays, festivals Availability of key interlocutors such as local leaders Availability of transport Availability of good maps The severity of humanitarian need. If many people are dying, a more rapid security assessment may sometimes be necessary, to allow the programme to begin as soon as possible but this is a matter for careful judgement since too rapid an assessment can be dangerous. The most important requirement of a security assessment is to talk to the people who will best explain the security situation. These may be many different types of people, for example: Ordinary residents, selected at random in a representative variety of locations Local leaders, such as mayors, elders, village heads, governors, politicians Women: often a special effort is needed to meet with women (separately from men, if possible, since their opinions and information may be significantly different from those of men) Religious leaders Staff of local NGOs Staff of international humanitarian organisations (both national and international staff) Business people Diplomats Other knowledgeable people, such as former humanitarian staff, academics, etc Informal conversation often yields the most useful information, although with local leaders a more formal style may be appropriate, depending on the culture. The person assessing will wish to know the answers to a large number of questions, including: General situation What is happening in the political arena? What is the economic situation? What are the main sources of income? How much poverty is there, and what causes it? Is there high unemployment? What is the social make-up of the area? What local religions are there, and how many people follow them? What is the history of the area? Threats What are the main threats XE "Threat: assessing threats"  to humanitarian organisations in this area? What types of crime are there, and how much? Do these threats vary by area, or by type of humanitarian organisation? Do they vary at different times of day, or times of the year? Are different types of staff threatened in different ways? (E.g. national, international, male, female, or staff of a particular ethnic group.) Are some threats different for nationally-recruited staff and their families? What security incidents have there been in recent months and years? Have any of these incidents involved humanitarian or other international organisations? Are there any threats originating from outside the area? How can one get information about these? Are there any terrorist threats XE "Terrorism" ? If so, are they serious enough that specialist advice on anti-terrorism security measures will be necessary? Local attitudes What are the most appropriate ways of winning acceptance from local people? How well is the work of humanitarian organisations understood by local people and leaders? What is the attitude of local people, and local leaders, to humanitarian organisations at present? What rumours are circulating? Is there truth in them? What do they reveal about local attitudes? Are any local groups or individuals hostile to humanitarian organisations? How would my particular organisation be viewed locally? What would be the best ways for us to explain our role to local people and leaders? What impact would our arrival have on local opinion? What impact would our presence have on the security of local people? Would our work be valued by local people and leaders? How would international staff (of various kinds and nationalities) be viewed? How would national staff (of various kinds) be viewed? Are there any cultural practices or issues that we should be aware of? Are there any corruption issues to consider? Will we be able to work here without paying bribes? Are any nationalities or ethnic groups especially vulnerable in the local context? Local authorities Do local authorities require humanitarian organisations to register? What conditions are imposed, if any? Our organisations profile Should we adopt a low, medium or high profile when we deploy? Are there suitable places for our offices, warehouses and accommodation? Are there any issues that might affect our impartiality? For example, will we need to work on both sides of a front line, or among several ethnic groups, to demonstrate our impartiality? How can we ensure that we remain independent, and perceived as such? For example, should we locate our office or accommodation deliberately far from the residence or office of prominent local leaders? Protection What protection measures are we likely to need? Will we need to use armed guards (normally only in extreme circumstances see Annex 13)? What security-related equipment will we need? Influential people and groups Who are the most influential leaders locally? What ethnic groups are there, where are they, and who are their leaders? What other organisations (e.g. military, police, civil, political, business, religious, cultural) have influence locally? What are the aims of these groups? Where do these groups draw their power from? How are they perceived by local people? What are the relationships between all these groups? What permissions, from whom, will we need to do our work? How long will it take to get those permissions? Staff Are there any issues concerning recruitment XE "Recruitment"  of national staff? Will there be any problems finding people of the right abilities? Will a fair recruitment process be possible? Will national staff face risks because of their work? What security measures would need to be provided for national staff homes, and for their travel to and from work? Is it more appropriate to use national or international staff? Male or female? In what proportions? What key posts are essential to security? Will we be able to fill them? Movement and access How much freedom of movement is there for humanitarian organisations? Will we have access to the areas we plan to work in? Is there a curfew in place? Give clear details of times for different locations. Are there feasible evacuation routes? Property Will the organisations property be safe? What risk is there of the organisations goods contributing to violence? (If, for example, they are stolen and sold.) What is the attitude of the authorities towards the property of humanitarian organisations when a programme closes? Insurance Is there a reputable local insurance provider? Site security Will it be possible to have a secure office, accommodation and other sites? Security forces How well does the local police function? How disciplined are the local armed forces? Overall Does the likely benefit of our work outweigh the security risk? Will the organisations presence endanger others? It is important to be aware that some information may be inaccurate, either deliberately or accidentally. Checking key information with a variety of sources should help to minimise this risk. Documents may be available which help to answer the above questions. Relevant documents may come from a wide variety of sources, including: UN or NGO reports, and old archives Media reports and articles local and international Academic papers Government publications Many useful documents are available on the internet. Some useful sources include: ReliefWeb  HYPERLINK "http://www.reliefweb.int" www.reliefweb XE "ReliefWeb" .int UN Integrated Regional Information Network (IRIN)  HYPERLINK "http://www.irinnews.org" www.irinnews XE "United Nations: Integrated Regional Information Network (IRIN)"  XE "Integrated Regional Information Network (IRIN)" .org UN Humanitarian Information Centres (HICs XE "United Nations: Humanitarian Information Centres (HICs)"  XE "Humanitarian Information Centres (HICs)" )  HYPERLINK "http://www.humanitarianinfo.org" www.humanitarianinfo.org International Crisis XE "International Crisis Group"  Group  HYPERLINK "http://www.crisisweb.org" www.crisisweb.org AlertNet  HYPERLINK "http://www.alertnet.org" www.alertnet.org It is essential during an assessment visit to get a feel for the area. How best to do this depends on the area. It may be helpful, if it is safe to do so, to: Walk through various parts of the main town(s) Visit markets and chat to traders and customers Drive down important roads, stopping to talk to people from time to time Visit out-of-the-way villages and talk to people In some cases, it may not be safe to do some or all of these things. Since you are on an assessment and may not know the area well, it will be necessary to take advice from a trusted source on what is safe to do and preferably to be accompanied by a reliable person who is familiar with the area and can help ensure that you stay safe. When talking with local people during an assessment visit, there is a danger of causing misunderstanding. Depending on the culture and context, your short visit may be taken as a promise to return, bringing aid with you even if you clearly explain the reason for your visit and are careful to make no promises. This could cause problems for you or for other humanitarian workers. If you are not familiar with local customs, it can be easy to cause offence without realising it, particularly when asking questions. If your visit is quick, that alone can cause offence in some cultures, where taking time to greet and talk is an important part of politeness. These considerations should be taken into account when planning an assessment and may result in deciding not to visit certain locations or people but to find out security-related information in another way. Ideally, the assessment should be written. This allows senior managers to check and approve it. It enables easy dissemination to other team members. It also leaves a record on file, for evaluation and accountability purposes. A possible outline structure for a security assessment is as follows: Location, date and author. General situation. Local authorities. Threats List of threats The likelihood of each threat occurring The likely impact of each threat, if it occurred Threats can helpfully be plotted on a chart see the end of this Annex Our vulnerabilities to the threats Security measures needed to minimise those vulnerabilities What liaison will be required with other organisations Conclusion: Does the likely benefit of our work outweigh the security risk? Will the organisations presence endanger others? Recommendations If the humanitarian need is very urgent there may not be time to write the assessment in full: in this case a summary should be written. In extreme cases, where action is required in a matter of hours, senior managers may give permission for the security assessment not to be written. In this case they should normally record this decision, with their reasons, in order to explain why normal good practice has not been followed. See also the Threat Impact Chart in Annex 38. Security briefing The length and content XE "Security briefing"  of security briefings will vary according to the situation, and according to the job that the particular staff member is doing. But in general, most initial security briefings are likely to cover at least the following topics: Local geography: major features; centres of population; routes; condition of roads; natural hazards such as flood, earthquake, eruption; any other aspect that may affect security. Considerable effort should be made to obtain good maps of the area to permit effective briefing. History of the area, particularly as it affects the current political and security situation Political situation and any political trends, issues or sensitivities Ethnic groups in the area, their different histories, characteristics and aspirations Culture and custom in the area, including acceptable methods of greeting, languages used, actions and phrases to avoid Key local personalities, including political and other leaders Local laws, as they affect humanitarian organisations Local police and other relevant officials Armed forces and other armed groups in the area Driving rules and customs Likely threats to XE "Threat: briefing on threats"  humanitarian organisations Procedures and other advice for responding to those threats Recent security incidents Location of local medical facilities Evacuation routes Other humanitarian organisations in the area Phone numbers and/or radio channels and callsigns to call in an emergency The background to the organisations current humanitarian programme Authorisations necessary for humanitarian organisations Issue of identity documents and explanation of when they are required Security plan, including all security-related rules and procedures Enough time for any questions to be fully answered Nationally-recruited staff will already be aware of some of the above information: it will be for the manager to judge which parts of the briefing should be omitted for them. It is highly desirable, indeed essential if circumstances permit, to brief international staff fully on the general situation, and not only on the security-specific aspects of the situation. This will help them to understand the environment in which they will be working, which in turn can help them to make good security decisions. It may be helpful for a manager to prepare a written orientation briefing document, containing some basic information on the situation. It may contain, for example: Name of Head of State Name of Prime Minister Governing Party/Parties and their leaders Government in force since [date] Government mandate expires on [date] Opposition Parties and their leaders Local government authorities relevant to humanitarian work; their functions; names of key officials; their contact details Description of the conflict, if any Description of local crime situation Names of military, paramilitary or bandit forces in the area Contact details of local Embassies or Consulates National staff may XE "National staff"  have little or no need to be briefed on the local situation. But they will need to be briefed on the organisation which is employing them. Contents of such a briefing may include: Brief history of the organisation Aims of the organisation Areas where it works Number of staff Sources of funds Names of Chief Executive and other senior managers Name of desk officer for this area Location and contact details of HQ Relevant policies and regulations of the organisation The culture of the organisation The organisations plans in this area Notes: 1. The aim of security briefing is to enable staff to understand the local situation sufficiently to live and work safely in it. 2. A security briefing should be given to all internationally-recruited staff before they travel to an insecure location. This briefing should be as thorough as possible, but usually can not be as detailed as a security briefing on the ground. On arrival, a further security briefing should be given which goes into greater detail and gives fully up-to-date information on the situation. 3. Nationally-recruited staff should receive a full security briefing before they start work. 4. In some circumstances it may be necessary to provide a security briefing to the family members of staff, either directly or through the staff member concerned, and to give them written instructions or an edited version of the security plan, if necessary. Security incidents: prevention and reaction Managers should ensure that their staff are properly prepared, both to minimise security XE "Incidents"  risks and to respond to incidents. Below are listed some suggested ways of reducing the risk of different types of incident, and of reacting to incidents if they occur. The points below will not apply in all situations: the best response will depend on the particular circumstances. But they may serve as helpful suggestions, to be adapted as appropriate. Security incidents and some health and safety incidents are included in the same list, for ease of reference. Accidents Vehicle accidents In many cases, driving is XE "Accidents"  the most dangerous activity that humanitarian staff do. While accidents are not strictly a security issue, they are mentioned in this Guide because of the large number of humanitarian staff killed and injured while driving. Great effort should be made to ensure safe driving, and well-maintained vehicles, so that accidents are avoided as far as possible. Once an accident has happened: Stop quickly and safely. Pull off the road if it is safe to do so. Note: in some cultures it is not safe to stop if you have just been involved in an accident, since onlookers are likely to beat or even kill the occupants of any vehicle they think has caused the accident. In these cases it is normal to drive on, even if there have been casualties XE "Casualties" , and seek help from the police or other responsible authority. But in many cultures it is imperative to stop immediately, indeed is a criminal XE "Crime"  offence not to do so. This underlines the importance of good local knowledge, and briefing for new staff. Prevent further danger. It is vital to prevent further danger to passengers, onlookers and other road users, after an accident has happened. This may involve: Removing from vehicles any passengers who are in imminent danger Putting out warning signs. Warning triangles should be placed far in front of the accident, facing towards oncoming traffic in both directions. If a warning triangle is not available, improvise an alternative (e.g. place a person there to signal to traffic, or use a warning known to local people, such as twigs and leaves on the road). Putting out a fire, or preventing a fire if one is likely (e.g. if there has been a fuel spill) Directing traffic past the accident, if necessary Directing pedestrians and any onlookers out of the way of traffic and other hazards Give first aid to any who need it Call an ambulance if necessary, or if an ambulance is not available, make other arrangements to take casualties XE "Casualties"  to the nearest emergency medical facility, perhaps using your own vehicle Call the police Take the names and addresses of any witnesses Exchange contact details with any other parties involved in the accident If you have a camera, take photographs of the positions of the vehicles after the accident, and any other relevant items, if doing so will not antagonise bystanders On the arrival of the police, cooperate fully with them Show courtesy and respect to all parties. If anyone has been injured in the accident, even if the fault was not yours, consider visiting them and/or their family, bringing a small present if appropriate. This helps to build local goodwill and can therefore be helpful to your security. After the incident, make a detailed record of it. Identify any lessons to learn, and ensure that any necessary changes in procedures are made. If disciplinary action is appropriate, ensure that it is taken swiftly and fairly. Proper accountability is particularly important relating to road accidents, because of the large numbers of deaths and injuries they cause to humanitarian staff. Record the incident in the organisations accident book Non-vehicle accidents Humanitarian staff are at risk of a variety of hazards not involving vehicles. Examples include: Electric shock Natural hazards such as rock falls or mudslides, floods or earthquakes Tripping, slipping or falling Drowning Burns Managers should ensure that staff exposure to these hazards is minimised and that appropriate measures are in place to limit the impact of such incidents or to speed recovery from them. It is good practice for all field locations to maintain an accident book. All accidents should be reported to managers and recorded in the accident book. Near misses, i.e. cases where an accident was only narrowly averted, should be recorded in the same way. The book should be inspected regularly by senior managers in order XE "Managers: senior managers"  to ensure that any necessary lessons are learned. In industrialised countries, it is estimated that 70% of workplace accidents could be prevented if employers put proper safety control measures in place. A full discussion of health and safety measures is beyond the scope of this document, but it is clear that good security management which fails to take account of non-security hazards amounts to an unbalanced approach to staff safety. Air attack There are several kinds XE "Air attack"  of air attack including: Bombing Gunfire Missiles As with all other threats, it is vital to assess the threat of air attack. In particular: Is an air attack likely? If there is an air attack, is it likely to be aimed at you? What are the likely targets of an air attack? Are any of them near to you? If there is an air attack, what kind is it likely to be? In view of all the above, what security measures should you put in place? What kind of shelter do you need? If the risk of air attack is high, should you even be present in the area? For information on shelters, see Annex 33. In the event of an air attack, the correct action will depend on the type of attack and your location. The following procedures may be appropriate, depending on the circumstances: Drop instantly to the ground. Lie completely flat. If it is possible to roll or crawl into a ditch, into a building or behind a wall without raising your profile, do so. This may give you some protection. Otherwise, remain still. Most blast and shrapnel fly upwards from the site of the explosion in a cone shape, so your best defence is to stay as low as possible. In this way it is often possible to survive explosions that are very close by. Observe what is happening Do not move until you are confident that the attack has finished. Beware: it may appear to have finished when in fact a second wave of attacks may be about to start. If there is a security officer for the humanitarian organisations, he or she may be able to announce the all clear by radio but often this is not possible. You may therefore have to wait a long time before you can be reasonably confident that no more attacks are coming. If you are in a building, drop to the ground and move away from windows. Many injuries and deaths are caused by shattering glass. If it is safe to do so, move into the pre-designated shelter, without raising your profile. As with all incidents, do not use the radio unless it is absolutely necessary. Do not call your colleagues to check if they are safe: if they need help, they will call you. Keep the radio channels clear so that those who have emergency needs can use them. Report the incident as appropriate Air crash Although aircraft crashes XE "Air crash"  are usually seen as a health and safety rather than a security issue, they have accounted for a significant number of humanitarian staff deaths in recent years. For this reason the topic is included in this Guide. Humanitarian managers are able to reduce the risk of air crash in some respects, including: The choice of airline or air charter company Avoiding higher-risk routes Keeping up to date with the security situation at both ends of a flight route, and along its path Humanitarian organisations should decide which companies to avoid, and which routes to avoid, and stick to this decision. If an air crash does happen, involving a member of staff, local authorities are likely to organise search and rescue efforts. The relevant manager should ensure that the staff members Next of Kin are immediately informed, and kept up to date with the situation. See Annex 22 for a suggested procedure for informing Next of Kin. Ambush The best defence against XE "Ambush"  ambushes is to avoid them. Good security assessments, combined with mature and careful decision-making, will lead to decisions not to travel in areas where ambushes are likely. While one can reduce the chances of meeting an ambush, one cannot eliminate the possibility without stopping all travel XE "Travel: decision to travel" . In some circumstances, stopping all travel, at least for a time, may be the best decision. In other circumstances humanitarian managers may decide that, if for example the risk of ambush is very low and travel is essential in order to save many lives, travel is justified. This is a matter for case-by-case decision by experienced and competent managers. Armoured XE "Vehicles: armoured vehicles"  vehicles can be a further protection against ambush, appropriate in some circumstances. They require drivers who are familiar with the different handling qualities of these vehicles. They are expensive to buy and maintain. They do not protect against all types of weapon. They can also give an unfortunate impression to local people that you wish to fortify your organisation. If staff are ambushed, there are methods of reacting which can increase the chances of survival. While there have been many unfortunate cases of people being killed and injured in ambushes, there have also been cases of people surviving unhurt. The best action to take will depend on many factors, including the nature of the road, the terrain, whether staff are on foot or in a vehicle, the type of vehicle, the number of people travelling, the level of training of those travelling, the goals of the ambushers, the number of ambushers and their level of training, the kind of weapons used, etc. If the staff travelling are knowledgeable about as many of these factors as possible, their ability to make good decisions will be increased. There follow some possible procedures for reacting to some types of ambush. They may be advisable in some circumstances but may not be appropriate, or may even be dangerous, in others. Good judgement and training are required, to enable a good decision to be made at the critical moment. These procedures are provided to staff to help them think through their possible responses in advance. It is vital that procedures suggested here are selected and adapted as appropriate to the local situation. Scenario one: ambush using a roadblock You round a corner and see a roadblock (or even simply a checkpoint) ahead. Your knowledge of the area tells you that this is not a normal checkpoint, but could be an ambush. You will have to assess very fast whether it is simply a checkpoint, with no hostile intent, or whether it may have hostile intent against you If you assess that it may be violent, stop immediately if you can. Then reverse back round the corner. Once round the corner, if the road is wide enough, turn round and drive away. If it is not wide enough, continue reversing. Send an immediate incident report. If the roadblock is so close that stopping and reversing is likely to result in being attacked, an instant decision is necessary, as follows: If you assess that the intention of the roadblock may be to kill or injure you or your passengers: Drive fairly fast through the roadblock if it physically possible. This may include ramming an obstacle in order to knock it out of the way. Do not drive so fast that you may lose control. Do not zigzag, since you are likely to roll the vehicle. Once through the roadblock, keep driving at a safe speed, even if you are being shot at, and send an immediate incident report as soon as you can. Your passengers should lie down throughout, or keep as low a profile as possible. If it is not possible to drive through the roadblock (perhaps because the obstacle is too big), consider reversing back round the corner even if it will attract shooting. Then send an immediate incident report. If it is neither possible to reverse round the corner, nor to drive through the roadblock, you have at least two further options: Slow to a halt, 5 metres or so in front of the roadblock, just as if you were at a normal checkpoint. Comply calmly with any demands made of you. It may be that the attackers do not wish to kill you: they may only want your vehicle and possessions, for example. If appropriate, negotiate with them and persuade them not to harm anyone. Send an immediate incident report as soon as possible, but do not do this within the sight or hearing of the attackers. Or, particularly if you are certain that you will be killed if caught, you may decide to drive off the road and escape across country. If it is not possible to drive off the road, stop abruptly and tell all passengers to run. This is obviously very risky, but it may save some or all of your lives, in which case it is better than everyone being killed. It may be wiser for each person to run in a different direction, so that if some are caught, others may escape. Send an immediate incident report as soon as possible so it is helpful if you can keep a radio with you as you flee. If you are confident that the intention of the roadblock is not to kill or injure: Slow to a halt, 5 metres or so in front of the roadblock, as if you were at a normal checkpoint. Comply calmly with any demands made of you. Remember that losing a vehicle or other possessions is not important, compared to saving a life. Hand over anything demanded, swiftly and calmly. If the attackers then leave, make no sudden movements until they are out of sight. Then send an immediate incident report, if possible, and move all staff to a safe location. The following flowchart is a simplified illustration which summarises some of the possible procedures described above.  Scenario two: ambush not using a roadblock Driving along a road, you hear gunfire close by. It may hit the vehicle. Or you may not be sure if it is aimed at you, and it may not be clear where it is coming from. Accelerate, if it is safe to do so, and drive on past the ambush. (Assume that it is an ambush: do not take time to check.) Do not drive so fast that you may lose control. Do not zigzag, since you are likely to roll the vehicle. Keep driving at a safe speed, even if you are being shot at. Your passengers should lie down throughout, or keep as low a profile as possible. Send an immediate incident report as soon as you can. It is difficult to make good decisions in the middle of an ambush. But it is a little easier if staff are competent, well trained, well briefed and experienced. It is better by far to avoid ambushes altogether, through good security assessments and wise decision-making. In the heat of the moment, staff who have just survived an ambush can forget to send an immediate incident report. It is vital that they remember to report, both for their own safety and to warn other road users not to fall into the same ambush. Arrest or detention Humanitarian staff are sometimes arrested XE "Detention"  XE "Arrest"  or detained. The risk of this happening can be significantly reduced by: Good relations with local authorities and groups Appropriate behaviour, on and off duty Obeying local laws and customs Ensuring that all legal documentation is correct, and carried by all staff and vehicles as required Training and briefing staff before they begin their assignments If a staff member is arrested or detained, their manager should take swift action. The best action to take will depend on the circumstances, but may include: Visit the staff member as soon as possible, to reassure them and to establish the facts Meet a senior official of the organisation which has detained your colleague. Depending on the circumstances, you may decide to request their release, or to protest at their detention and demand their release. Obtain the assistance of a lawyer, if necessary Inform other humanitarian organisations. If they consider the detention unjustified, they may wish to take coordinated action to persuade the authorities to release the person concerned. Inform the ICRC and ask their advice, if appropriate Inform consular authorities, if the staff member is from another country Inform the Next of Kin if XE "Next of Kin: informing Next of Kin"  the person is not released very quickly In many cases, the knowledge that other international organisations are aware of the detention may be enough to persuade the authorities to release the detainee. In other cases, the detention may be justified, if the detainee has in fact committed an offence or is reasonably suspected of having done so. If so, it is important to respect the duty of the authorities to ensure that correct legal procedures are followed. Your lawyer should advise on the best course of action. The detention may in reality be a hostage seizure. This may not be apparent at first, but may become clear when demands are made for ransom XE "Ransom"  XE "Kidnap" , or other conditions for release. In this case see the section on kidnap in this Annex for further information. Assault An assault may XE "Assault"  accompany a robbery or other crime. An assault may also occur with the simple aim of killing or injuring. Every situation is different, and you should use your judgement to decide the best response if you are assaulted. Options to consider include: Run away Call for help, using radio, telephone or your voice Attract attention: scream, shout, use an alarm, sound your vehicle horn, etc Defend yourself Submit (this is only an option if you assess that your attacker will not try to kill you) Self-defence techniques require training and practice, but can give self-confidence. Self-defence using an improvised weapon XE "Weapons"  also requires skill, and the weapon could be taken from you and used against you. It is normally forbidden for staff of a humanitarian organisation to carry weapons. Bomb Bombs can XE "Bombs"  take a variety of forms, including: Car bombs Letter bombs Booby trap bombs Suicide bomb attacks Bombs dropped by aircraft The first four of these are sometimes known as improvised explosive devices (IEDs XE "Improvised Explosive Devices (IEDs)" ). Prevention As with all other threats, it is important to assess the threat posed by bombs, if any. If you assess that there is a threat of bombs, you are likely to need specialist advice on what security measures to take. A car bomb threat may require the prevention of vehicles from coming within a certain distance of any location regularly used by staff, and may oblige staff to check vehicles for bombs before using them. A letter bomb threat may require specialist screening of letters and staff training. If a suspicious letter or package is discovered, it should be put down gently. Do not put anything on top of it, and do not put it in water. Evacuate the building and the area around until the package is examined by an expert. Suspicious characteristics to look for include: An unusual or unknown place of origin No return address An excessive amount of postage Abnormal or unusual size Oily stains on the package Wires, strings or metal foil protruding from or attached to an item Incorrect spelling, poor handwriting or typing on the package label Differing return address and postmark, or incorrect address Unfamiliar handwriting Peculiar smell. (Many explosives used by terrorists smell of shoe polish, machine oil or almonds.) Unusual heaviness or lightness The packaging may be soft but the contents will feel hard The package may be wrapped more than normal Uneven balance or shape Springiness in the top, bottom or sides The package may have been delivered by hand by someone you dont know Never cut tape, strings, or other wrappings on a suspect package or immerse a suspected letter or package in water. Either action could cause an explosive device to detonate. Never touch or move a suspicious package or letter. Most casualties XE "Casualties"  from urban terrorist attacks are from flying glass. Any bomb threat, or threat of other explosions (shells, grenades, rockets etc), will require windows to be fitted with blast film, and possibly special net curtains and other measures, to reduce casualties from flying glass. Blast film XE "Blast film"  should be polyester film 175 microns thick (including adhesive layers of multi-ply) or film with equivalent properties: thicker grades may be needed for large windows. You should consider how your programme would continue if an explosion destroyed a key building, important documents or assets. For further information, see Bombs protecting people and property, a guide published by the British Government Home Office. Reaction If a bomb is suspected or discovered, the best action to take will depend on the circumstances. As a general rule, the following procedure can often offer a framework for action: CONFIRM whether there is reasonable suspicion that it may be a bomb. Do not touch it or move it. CLEAR the area of people quickly, to a distance of at least 100 metres, but 400 metres if the suspected bomb is larger than a suitcase or is a vehicle. Leave doors and windows open, but do not stop to open them if this will delay your departure from the building. Do not use lifts/elevators. If possible, cut off electricity and gas supplies to the site, to reduce the fire hazard. CORDON off the area, at a radius of 100 metres (400 metres if the suspected item is larger than a suitcase or is a vehicle) from the suspected bomb, and allow no people to enter within the cordon. CONTROL the situation. Summon the police or other relevant authority. Follow their instructions when they arrive. If a competent police officer or other suitable official is present when the suspected bomb is discovered, he or she will supervise the above procedures. If no such official is present, the senior manager present should supervise until the police or equivalent arrive. Once the above steps have been carried out, the security forces will make the bomb safe or detonate it. No-one should re-enter the area until the security forces have given permission. If a bomb explodes, be aware that another bomb may be in the area. Provide first aid to those who need it, while clearing the area of other people and calling the police or other relevant authority. Bomb threat by telephone A bomb threat may be XE "Threat: bomb threats"  XE "Bombs"  received by telephone. In this case the following procedure may be appropriate, depending on the circumstances: Keep calm, dont hang up Record the exact wording of the threat Questions to ask: Where is the bomb right now? When is it going to explode? What does it look like? What kind of bomb is it? What will make the bomb explode? Did you place the bomb? Why are you doing this? What is your name? What is your address? What is your telephone number? If possible, make a note of: Background noises (street noises, house noises, music etc) Does it sound like a local, long distance or international call? The accent of the caller The voice of the caller (loud, soft, clear, muffled, calm, emotional etc) The callers sex, estimated age The time, date, duration and number called Report the call immediately to your manager and to the police or other appropriate security force Evacuate the location immediately, following the procedure given under Reaction above. Inform the police or other relevant authority. Many bomb threats are hoaxes. But treat all bomb threats as real and urgent until the area has been searched, and the police have pronounced it to be clear. There have been cases where slow reactions to bomb warnings have led to additional deaths and injuries. For further information, see Bombs protecting people and property, a guide published by the British Government Home Office. This also contains a form for completion by the person who receives a bomb threat phone call. Chemical, biological or radiological attack It is beyond XE "Radiological attack"  XE "Chemical attack"  XE "Biological attack"  the scope of this Guide to give advice on the complex topic of chemical, biological or radiological attack. If a threat of this kind is identified, consider whether your staff should continue to work in the area. If you do continue to work, expensive training and equipment are likely to be necessary. Crowds Crowds can XE "Crowds"  be entirely peaceful. However, they can pose risks including theft XE "Theft"  and violence. A peaceful crowd can sometimes turn into a violent mob or a riot. It is important to be aware of when crowds are likely to form (such as during festivals or political demonstrations) and what their purpose is. If you assess that they may turn violent, keep away. If you find that you are in a crowd which you think may become violent, try to keep a low profile and blend in as far as possible, while moving away from the crowd as soon as you can. Never encourage a crowd to form (for example when planning a distribution) unless you are certain that you can meet all their expectations in a timely way. Earthquake If you are working in an earthquake-prone area, you XE "Earthquake"  should take appropriate precautions. Consult earthquake expertise, which may be available locally. Issues to consider may include, but not be limited to: Assessing the risks of working in an earthquake-prone area Finding an earthquake-resistant building to live/work in (this may be difficult or impossible in some circumstances) Being prepared for an earthquake, for example as follows: Secure equipment so it does not fall on people, fixing filing cabinets and bookcases to walls Anchor and brace gas and fuel tanks Restrain desktop computers and other appliances (for example with hook-and-loop (Velcro) adhesive pads) Install latches on cabinet doors and drawers Stock emergency food and water, etc Recognising the signs of a tremor or quake Immediate action Post-earthquake action Other risks, e.g. broken gas or fuel pipes Fighting Humanitarian staff should aim to avoid XE "Fighting"  being in locations where there is armed conflict, unless there is a vital reason for them to be there and the likely benefits of their work outweigh the risks. Even so, any staff working in situations of fighting should understand the risks and should remain in the area only if they are freely willing to do so. In some cases the fighting may present little threat to humanitarian staff or programmes, in which case it may be assessed that the benefit of staying outweighs the relatively low risk. By being well informed of the local situation, managers and staff should be aware of when tensions rise and fighting becomes more likely. They should adjust their plans accordingly, in order to avoid being exposed to fighting if and when it breaks out. In some cases this may mean being prepared to evacuate from the area. In other cases it may mean sheltering while the fighting goes on. The organisation may have a mandate to assist people during fighting for example with medical treatment. If so, depending on the circumstances, the work may continue provided that staff are not directly threatened. There is no substitute for training staff in reacting to the outbreak of fighting. Reading a manual cannot give anything like the same level of preparation. By teaching them the practical skills, then practising them in those skills until they can do them themselves, it becomes more likely that in a real event they will react appropriately. Nevertheless, some written explanation in this Guide may be helpful. If you are caught in the open when shooting or explosions XE "Shooting"  (such as mortar or artillery fire) take place, the correct action will depend on many factors including the type of fighting and your location. The following procedures may be appropriate, depending on the circumstances: Shooting, when you are on foot in the open Drop to the ground and lie flat, unless you believe that you are the target and that you would still be visible to your attacker. If you believe you are the target, dash to a place which is out of sight of your attacker. Move rapidly away from the source of the shooting, remaining out of sight, towards a place of safety. If you assess that the shooting was not aimed at you, lie flat and remain still if it is safe to do so. If it is possible to roll or crawl into a ditch or other location that will shelter you from stray bullets, do so but if there is a danger of landmines, remain out of ditches and other places which may be mined. Shooting, when you are in a vehicle Assess rapidly what is happening and use your judgement to take the appropriate action. Are the shots coming from ahead of you? If so, it may be best to stop, get out of the car and lie flat on the ground away from the vehicle in a ditch if possible and if the area is not mined. If you assess that those shooting may wish to target you, it may be best to turn round and drive away. If you cannot tell where the shots are, or if they are around you or behind you, it may be best to assume it is an ambush, XE "Ambush"  accelerate as much as is safe, and drive on. The other alternative is to stop, get out of the car and lie flat on the ground away from the vehicle in a ditch if possible, well away from the car (provided that it is not an area at risk of mines) since the car may attract shooting. You will have to judge which of these two options is best. Shooting, when you are in a building Drop instantly to the floor. If it is possible to crawl without raising your profile to the designated shelter XE "Shelters" , or to an inner room or corridor that is better protected than other rooms from stray bullets, do so. Stay away from windows: shattering glass is a major cause of death and injury. Explosions, XE "Explosions"  when you are on foot in the open Drop instantly to the ground. Lie completely flat. If it is possible to roll or crawl into a ditch, into a building or behind a wall without raising your profile, do so. This may give you some protection. Otherwise, remain still. One explosion may well be followed by another, which may be nearer to you. Most blast and shrapnel fly upwards from the site of the explosion in a cone shape, so your best defence is to stay as low as possible. In this way it is often possible to survive explosions that are very close by. Take account of the local situation. In some circumstances, grenade attacks are often followed by large volumes of indiscriminate fire. In other cases, initial small bombs are used to attract a crowd, and then a large bomb is timed to go off 5 to 30 minutes after the first, to kill many of the crowd. In these cases it is likely to be best to leave the area quickly after an explosion. Explosions, XE "Explosions"  when you are in a vehicle Stop the vehicle, get out fast and lie flat on the ground away from the vehicle, or in a ditch if available and safe. If however you assess that you may be targeted and that the risks of stopping are greater than the risks of remaining in the vehicle, then it may be best to drive away as fast as is safe. As always, the decision depends on an assessment of the situation, and good judgement. Explosions, XE "Explosions"  when you are in a building If you are in a building, drop to the ground and move away from windows. Many injuries and deaths are caused by shattering glass. If it is safe to do so, move (without raising your profile) into the pre-designated shelter, or to XE "Shelters"  an inner room or corridor that is better protected than other rooms from stray bullets. Stay away from windows. After you have taken the appropriate immediate action Provided that you are not a target of the attack, do not move until you are confident that the attack has finished. Beware: it may appear to have finished when in fact a second attack may be about to start. If there is a security officer for the humanitarian organisations, he or she may be able to announce the all clear by radio but often this is not possible. You may therefore have to wait a long time before you can be reasonably confident that no more attacks are coming. If you assess that you may be a target of the attack, use your judgement to determine the best course of action for example, in some circumstances it may be best to move to a safe location rather than to stay in the same place. As with all incidents, do not use the radio unless it is absolutely necessary. Do not call your colleagues to check if they are safe: if they need help, they will call you. Keep the radio channels clear so that those who have emergency needs can use them. Report the incident as appropriate, bearing in mind the need to keep radio channels clear while others may need them for emergency messages. Fire All staff should be aware of the fire procedure. A simple framework, applicable in many circumstances but not all, is as follows: If you discover a fire, raise the alarm by shouting Fire! and operating the fire alarm, if there is one Use a fire extinguisher or blanket to put out the fire if it is safe to do so and will not put your life or others lives at risk Leave the building as fast as possible. Walk rather than run, in order to avoid accidents. Go to the fire assembly point. Close doors behind you as you leave, to help prevent the spread of fire Remember that smoke can kill. If there is smoke, crawl to keep your mouth below the level of the smoke. A nominated person should check that the building is empty of people. If the building is large, a system of fire wardens XE "Wardens"  should ensure that all parts of the building are empty of people. A roll call should be taken at the fire assembly point to ensure that all occupants are accounted for. Call the fire brigade, if there is one. If not, raise the alarm among neighbouring buildings and improvise fire extinguishing efforts. Do not re-enter the building until a properly qualified person announces that it is safe to do so For suggested fire safety precautions, see Annex 12. Flood If there is a risk of flooding XE "Flood" , this should be identified in a security assessment, and measures taken accordingly. If possible, buildings should not be used which are in flood-prone areas, and routes should not be used at times when they may be flooded. If however there is a risk of flood, the following simple precautions may help: Construct barriers to divert water and protect buildings Store any critical items, which may be damaged by flooding, above the level which may be reached by the water Ensure that there is sufficient accommodation on an upper floor which cannot be reached by the water Keep a stock of food, water and a means of cooking, above flood level Keep a stock of relevant medicines Ensure that there are toilet facilities, even if only improvised ones, above flood level Keep communications equipment above flood level. Ensure that batteries are kept charged. If possible, store a small generator XE "Generators"  above flood level to provide power for battery charging and other needs. If necessary, store a boat for transport during floods. Make sure that it is only used when it is safe to do so, and that it is used by a qualified and competent person. Other safety equipment may be necessary, such as life jackets. Fraud Fraud is defined XE "Fraud"  as a deliberate, improper action which leads to financial loss to the organisation. This includes theft XE "Theft"  of goods or property; falsifying expenses claims; and falsification (or destruction) of records to conceal XE "Financial security: accounting records"  an improper action. Fraud does not include: accounting XE "Financial security"  errors; actions condoned by established practice; and cases where no loss is incurred. Other possible irregularities include unauthorised activities for private gain: e.g. borrowing from petty cash; use of vehicles; or abuse of telephones and other equipment. Inevitably, fraud has a damaging effect on the organisation. Not only does it divert resources from beneficiaries, but it can damage effectiveness, morale, credibility, and ultimately the organisations funding and even its survival. Incidents of fraud and irregularities require sensitive handling to minimise the long-term impact. It is important to be prepared to deal with any occurrences of fraud or financial irregularity by having a written procedure which covers the steps that need to be taken. It is of course better to prevent fraud than to have to react to it, by having good financial procedures in place see Annex 11. If, however, fraud does occur, or you think it may have occurred, the following steps may offer helpful suggestions, depending on the circumstances: Do not overlook the fraud or suspected fraud. Take action. If there are key documents or items of evidence, take steps to secure them before informing staff of any suspected fraud Announce an investigation. The investigation should be conducted by someone competent to do so, who is independent of anyone who could have been involved in the fraud. An alternative, perhaps appropriate where fraud is suspected but has not definitely occurred, is to announce a financial inspection, possibly one required by HQ. (This is easier to announce if it is known in advance that HQ is liable to announce financial inspections without notice.) The investigation should result in a written report to the Director of Finance, and should include: Confirmation of whether a fraud has taken place The amount of loss involved The identity of the person(s) who appear to have committed the fraud, if known Identification of any failures on the part of procedures or staff which enabled the fraud to take place Identification of any staff who should face disciplinary action Recommended lessons to learn for the future, and any procedures which need to change to prevent further fraud The Director of Finance or another senior manager should then ensure that any necessary disciplinary and other action is taken swiftly For further information on reaction to fraud and other aspects of good financial management, see  HYPERLINK "http://www.mango.org.uk" www.mango.org.uk. Grenade A hand grenade XE "Grenade"  is a small, hand-thrown bomb. It explodes either immediately or after a few seconds, sending blast and shrapnel over a wide area. If a grenade is thrown near you, the following procedure reduces the risk of harm in many circumstances. You should make a rapid judgement to decide the best course of action. Shout Grenade! and drop instantly to the ground, covering your head. If you can do so in such a way that there is a barrier between you and the grenade, do so. But the crucial action is to drop to the ground, since the blast and shrapnel from grenade typically rise in a cone shape. For this reason it is sometimes possible to escape injury by lying flat, even if you are near the grenade. If there is time, lie with your head furthest from the grenade, and your legs crossed, pointing towards the grenade Others should drop instantly to the ground in the same way as soon as they hear someone shout Grenade! After the explosion, check to see if there is another grenade, or other type of threat, before moving If there is no explosion within 30 seconds, crawl away on your stomach until you are in a safe area, with solid cover between you and the grenade. Ensure no-one approaches the grenade. Report the incident to the appropriate authorities. Take steps to ensure that there is no further danger When you are confident that there is no further immediate threat, give first aid to those who need it. Bear in mind that in some circumstances a grenade may be followed by other violence, in which case you should leave the area quickly. Call for medical help Report the incident Hijack vehicles Vehicle hijackings XE "Vehicles: vehicle hijack"  XE "Hijack: vehicles"  may be carried out for various reasons including the following: To steal the car or other belongings carried in it To use the occupants as hostages To use the car for another crime, perhaps using the cars identity as a cover To cause a political effect, such as demonstrating that the local security forces do XE "Civil-military relations"  not have full control of the area To injure or kill the occupants, perhaps in order to cause a political impact, or to ensure that the occupants do not reveal the identity of those who have stolen the vehicle Because of the dangers involved, it is important to avoid hijack if at all possible. While one can reduce the chances of being hijacked, one cannot eliminate the possibility without stopping all travel XE "Travel: decision to travel" . In some circumstances, stopping all travel, at least for a time, may be the best decision. In other circumstances, humanitarian managers may decide that, if for example the risk of hijack is very low and travel is essential in order to save many lives, travel is justified. This is a matter for case-by-case decision by experienced and competent managers. Armoured XE "Vehicles: armoured vehicles"  vehicles can be a further protection against hijack, appropriate in some circumstances. They require drivers who are familiar with the different handling qualities of these vehicles. They are expensive to buy and maintain. A hijack may be attempted in many ways. Among the most common are: Setting up a roadblock or checkpoint to stop the vehicle Surrounding the vehicle when stopped at traffic lights or in a traffic jam Using another vehicle to cut in on or ram the target vehicle, to force it to stop Setting up a fake accident or breakdown, to induce you to stop and offer help. The attackers, posing as casualties XE "Casualties"  or bystanders, then turn on you. If you assess that this ruse is a significant possibility in your area, all drivers should be instructed not to stop at accidents or breakdowns, but to drive on in case it is an attempted hijack. To prevent hijacking if you are being followed, the following action may in some circumstances be appropriate: Try and stay calm and do not start driving fast. You will alert the people who are following you apart from increasing the risk of an accident. Change direction to see if they still follow you but NOT into a small side road or somewhere you dont know. Keep to busy parts of town. Do not drive to your home but go to a police station, petrol station, UN compound etc If the hijackers start closing up on you, try and keep to the centre of the road to make it harder for them to overtake and cut in front of you. But be aware of the risk of causing a collision with oncoming traffic. If an attempted hijack does take place, a response similar to the response to an ambush may be appropriate (see the section on Ambush, in this Annex, for suggested anti-ambush procedures). If you assess that the hijackers are likely to kill or seriously injure occupants of the vehicle, driving away is likely to be the best response, if possible, even if this poses some risks. If a hijack succeeds and the hijackers demand the vehicle or other property, cooperate calmly and quickly, without making sudden movements which might be misinterpreted. Hand over anything that they request remember that no property is worth risking life for. Note that even innocent movements, such as reaching for the seatbelt release catch or for a document, can be interpreted as reaching for a weapon, so warn the hijacker before making such a movement. If a hijack succeeds and staff are taken hostage, see the section on Kidnap, in this Annex, for suggested action. Hijack aircraft Aircraft hijacking is statistically rare XE "Hijack: aircraft" , so it is unlikely that you will be the victim of a hijack. Aircraft may be hijacked for the following reasons, among others: To cause a political effect, such as obtaining publicity for a political cause To carry out a terrorist attack using the aircraft A mentally unbalanced person may attempt a hijack The best protection against hijack is to use only airlines which have good security procedures. Passenger vigilance can also help, by reporting anything suspicious to airline or security staff. As always, there is no 100% secure method of preventing hijack. The following precautions may help you to cope, should a hijack occur: Discreetly get rid of anything that you cannot explain or which might make the hijackers angry or suspicious Remain calm and obey the hijackers Respond simply, if you are asked questions by the hijackers. Do not say or do anything which might cause the hijackers to take an interest in you. Use your native language, even if the hijackers language is different and you are able to speak it. This could provide you with information as to what the hijackers intend to do next. Try to appear uninterested as to what is going on around you. Sleep, read a book, etc. Try to maintain your composure. Fear is natural. Pause, breathe deliberately and slowly, and try to organise your thoughts. Since the hijackings on 11 September 2001, some think that passengers should consider rushing the hijackers as a group, if they assess that the hijackers intend to kill more people by crashing the plane into a target. The idea is that, if a large number of passengers rush the hijackers, possibly carrying pillows, cushions or other items to act as shields, then some may be injured or killed but the hijackers are likely to be overwhelmed. In this way the target will be spared, and the passengers will survive if the aircraft can be landed safely. This Guide can make no recommendation as to the right course of action to follow: it must be an individual decision based on the circumstances at the time. In the event of a rescue attempt, slide down in your seat as far as possible or get onto the floor, and cover your head with your hands or a pillow to avoid being injured After the incident, you may feel a strong need to tell your story in detail. This is normal. Consider requesting a debriefing XE "Debriefing: after hijack"  from a trained counsellor. Some stress reactions can appear after a delay, sometimes months later. If so, recognise them and ask for counselling if necessary. Kidnap Humanitarian staff are unfortunately sometimes at risk of kidnap. They may be kidnapped for several reasons including: To hold for ransom XE "Ransom"  XE "Kidnap"  To cause a political effect or achieve publicity To be used as human shields As always, prevention is better than cure, so security procedures should be designed to minimise the possibility of kidnap, where it is assessed as a significant threat. If kidnap occurs, HQ should immediately set up a crisis management team XE "Crisis management team" . It may be appropriate for a similar team to be set up at the field office responsible for the staff member who has been kidnapped. It should be made clear at once which manager has responsibility for managing the incident. That manager should then consider the following actions, depending on the circumstances and his or her assessment of the best course of action: Inform the local police and other appropriate authorities Inform all relevant parties of the name and contact details of the incident manager. Request that no action be taken in relation to the incident without prior agreement with him or her. The incident manager should delegate responsibilities to colleagues as appropriate: e.g.: Contacting Next of Kin (see Annex 22 on informing Next of Kin). This should be a top and very urgent priority. Failure to do this quickly can damage the relationship of trust with the staff members family, particularly if they first hear the news through the media. This could then make the management of the crisis much more difficult. Answering enquiries from the press Keeping contact with all relevant staff and other agencies Providing 24-hour communications and logging all messages and events Marking maps Ensuring that the crisis management team XE "Crisis management team"  has sufficient food, water and rest Make a plan. Will you negotiate directly with the kidnappers, if that is possible? Or will you appoint an intermediary? (A trusted intermediary is often thought preferable, to give time for decision-makers to consider their responses to any messages from the kidnappers.) Decide whether to call in specialist advice, either from the police or from a reputable company specialising in hostage negotiations XE "Negotiation" . It may help if contact has been made with such a company before any kidnap occurs. If you are not sure that you have the necessary expertise to handle a kidnapping, specialist advice from a reputable company is strongly recommended. Allocate the necessary resources human, financial and other to ensure that your plan has the best possible chance of success Carry out your plan While you will naturally desire to conclude the incident safely and as quickly as possible, kidnap negotiations can sometimes last months or even years. Prepare the crisis management team XE "Crisis management team"  for this, while encouraging them to remain optimistic. Keep morale high: enough food and rest are helpful, but possibly the greatest aid to morale is to manage the incident well, keeping everyone fully informed, and taking the best available advice. Ensure strict confidentiality from the onset of the crisis. Information should be shared only on a need to know basis. This may require the usual management chain to be bypassed, e.g. if someone is part of the crisis management team XE "Crisis management team" , he or she should be exempted from reporting to his or her superior on the crisis. The staff member who has been kidnapped can improve their own chances of survival and early release in a number of ways including: Your only job is to survive. It is the HQs job not yours to achieve your freedom. At the time of your seizure, do not attempt to fight back. The time during and soon after the abduction is the most dangerous. Do not play the hero; do not talk back or act tough. You may be blindfolded and drugged Be calm, quiet and cooperative. Make no sudden movements. Try not to give up clothes or identification Try not to allow your kidnappers to exchange clothes with you: if there is a rescue attempt you could be mistaken for a kidnapper, and attacked Be certain that you can explain everything you have on your person. Do not carry any items that may call into question your motives or status within the mission. Fear is a normal reaction. Try to relax, pause, take a deep breath and accept the situation. Focus your mind on pleasant scenes, memories or prayers. As the situation stabilises, continue to keep a low profile. Be cooperative without appearing either servile or antagonistic. Follow the instructions of your captors. Be cautious about making suggestions to your captors, as you may be held responsible if something you suggest goes wrong Dont beg or plead, and try not to cry. It is normal to feel humiliated, but do all you can to maintain your dignity. Do not make threats against your captors or indicate that you would testify against them Avoid appearing to study your captors, although if you are able to notice unobtrusively their appearance, dress, and apparent rank structure, this may help the authorities after your release. Be a good listener. Do not argue. Be polite. Try to gain your captors respect and try to build rapport with them. An excellent topic of discussion is family and children. Emphasize that as a humanitarian, you are neutral and not involved in politics Encourage your captors to let the authorities know your condition and whereabouts Take care of yourself and build a daily routine: exercise, stay tidy and clean, sleep when possible Eat and drink even if you are not hungry Politely draw attention to anything you need or want, such as food, water, medicine, use of the toilet, books or writing materials Be patient and mentally prepared for a long captivity perhaps months Stay mentally active: read, write, exercise your memory Do not believe everything you are told Do not despair. Your survival chances increase with time. Do not attempt to escape unless your are certain you will be successful If there is a rescue attempt by force, drop to the floor and keep your hands over your head. Once the situation stabilises, or when the rescuers ask you to, identify yourself. Do not negotiate your own release for a ransom, even if your parents or friends are rich. This would conflict with the negotiations being conducted by your organisation. If released peacefully, this can also be a dangerous time. Obey instructions promptly. Make no sudden movements. Stay alert. Be prepared for delays and disappointments. Ransom should not be paid. All humanitarian organisations should have a clearly stated policy that ransom will not be paid in case of kidnap, since to do so encourages more kidnapping. The paradoxical truth is that, by paying ransom, organisations place their staff at greater risk than if they do not pay ransom. All staff should be informed of this policy before signing their contract, and the contract should clearly mention it as a condition of employment. Once the kidnap victim has been released, he or she will need time and space to recover. There may be medical or psychological needs, so a full medical and psychological assessment should be arranged, with counselling if appropriate. The needs of the victims family should also be catered for. Throughout the crisis, significant events and decisions should be recorded, and lessons learned wherever possible. After the end of the crisis a report should be written identifying any lessons to learn. By good leadership, good advice, efficient teamwork and a caring attitude, a kidnap incident may be well managed to achieve a successful result. For more information on kidnapping, see chapter 13 of Operational Security Management in Violent Environments. Looting Looting is a common XE "Looting"  problem in situations of disorder or conflict. It can affect any location including shops, warehouses and homes. If looters cannot be prevented, remember that life is more valuable than property: do not risk injury from looters in order to protect property. The risk from looting can be reduced by simple precautions including: Keeping reduced levels of stock in warehouses Making copies of key documents and records and keeping them elsewhere Bolting safes to walls or floors and minimising the quantity of cash in them Distributing goods between a number of sites Ensuring doors and windows are strong, and strongly locked Removing logos and any form of agency identification from vehicles so that the looters are not mistaken for agency drivers and staff Ensure you have records of serial numbers of vehicles and other high-value equipment, to help you trace and recover them in future Putting high value items in containers and welding them shut. Stack high value containers on top of others so that there is no access from ground level Blocking the doors of a warehouse with filled containers with welded doors Distributing valuable items among trusted staff (especially those who can keep them safe in rural areas) provided that this will not put them at unacceptable risk Keeping valuable items such as vehicles out of sight. Consider immobilising vehicles, for example by removing the wheels (if you may need a vehicle for an evacuation or other urgent journey, do not immobilise it if it will take some time to make good again). Medical emergency In a medical emergency, staff should follow standard first aid procedures XE "First aid" . A doctor or nurse should be called if possible, and depending on medical advice the casualty should be removed to a medical facility as soon as possible. A doctor should assess XE "Medical: evacuation (Medevac)"  whether medical evacuation (Medevac) is necessary. See Annex 20 for further information on Medevac. Mines, booby traps and unexploded ordnance (UXO) A common risk XE "Mines"  XE "Booby traps"  is from mines, booby traps or unexploded ordnance (UXO). Unexploded ordnance is unexploded ammunition such as bombs, grenades, rockets, shells or bullets. It is also sometimes referred to as explosive remnants of war (ERW). Before entering any area where there may be a threat from mines, booby traps or UXO in your area, all staff should be properly trained in Mine Risk Education XE "Mine Risk Education (MRE)"  (MRE) by a qualified instructor. In an area where mines, booby traps or UXO may exist, it is vital that all staff are fully aware of the threat; trained in how to avoid it and how deal with an emergency; and equipped as necessary. Make sure that all staff know what to do and whom to contact for help in case of a mine/UXO emergency. Avoiding mines, booby traps and UXO If you are working in an area where mines, booby traps or UXO have recently been a problem, you should make yourself familiar with what they look like. There are many different types. All of them can cause death and serious injury. You should also know the local methods for marking mines they may be different from the internationally recognised signs. Avoid going anywhere unless you are sure that it is clear of all mines. This means that you should have accurate information on the location of any areas that have not yet been cleared of mines. Sources of information (not all of them necessarily reliable) may include: Local police Local military force Local civilian authorities Hospitals and health posts International military force (if present) International police force (if present) UN security officer (if present) Mine clearance organisations (if present) Local people Other humanitarian organisations If in doubt, dont go to an area that you are unsure of. All staff should avoid touching or approaching any object which may be a mine, booby trap or UXO. Proximity to mines and UXO is always dangerous and should be avoided. Even objects that appear to have exploded should not be approached. They can still be lethal for at least the following reasons: They may not have fully exploded They may contain poisonous substances They may be a decoy for a booby trap. People are sometimes tempted to collect fragments of exploded ammunition, or even live ammunition, as souvenirs. This should always be avoided, both because of the dangers mentioned above and because of the suspicion that can arise if you are found in possession of such items. Other good practice in areas which may have a threat of mines, booby traps or UXO includes: Tell your colleagues where you are going, always including when off duty or at weekends Stay within radio contact Carry a first aid kit. Ensure all staff are trained in first aid. Travel with a local guide, if they are well informed Only use roads and tracks that have been well used, recently, by others Remember that mines may have been freshly laid, so that even a well-used track may have new mines in it. Allow sufficient time in the morning for local traffic to have travelled the roads before you. Do not move onto the verges of roads: stay on the tarmac (or if not tarmac, on the well-used road surface). This applies when in a vehicle and on foot. Do not approach suspicious objects. Mines and booby traps are sometimes disguised as attractive or interesting objects such as a toy, a cigarette lighter, etc. If you discover mines It can happen that, even if you think you have reliable information, you unexpectedly find yourself in an area that has mines. Page 51 and the following pages of the Landmine and UXO Safety Handbook gives advice on what to do in this situation. Note that many Mine Risk Educators now advise against prodding for mines, but instead advise staff who find themselves in a minefield to wait for help. As soon as you can safely do so, report the incident to your superior and to responsible local authorities. Remember that it is not safe to use a radio, mobile or satellite phone near mines, booby traps or UXO, as radio signals may detonate them. There is a debate among professionals as to whether non-specialist staff who have found a mine, booby trap or UXO should be instructed to mark the location. While marking it may warn someone else and protect them from injury, a non-specialist might accidentally detonate the device by the very act of marking the location. Whatever policy the organisation decides to adopt, staff should be clearly instructed on this point. For further advice on mine awareness and procedures, see the UN/CARE International Landmine and UXO Safety Handbook. Rape and sexual violence Everyone, male XE "Sexual violence"  XE "Rape"  and female, is a potential victim of sexual violence. It may take a variety of forms. It has such a serious impact on its victims that great care should be taken to minimise the risk of it happening. How to minimise the risks will depend on the local situation, but may include: Avoid walking or driving alone, particularly at night Avoid isolated, unsafe or poorly lit locations Avoid bars or clubs where crime is known to take place Trust your instincts if they tell you to leave, leave immediately Avoid drugs XE "Drugs"  and excessive use of alcohol Carry an alarm XE "Alarms"  Carry a radio or mobile phone Ensure that drinks are not deliberately contaminated XE "Drugs"  with drugs Dress unobtrusively XE "Dress"  and appropriately, bearing in mind the local culture Wear comfortable shoes Socialise in groups rather than alone Share accommodation rather than living alone Although the great majority of rape attacks are against women, some are against men. Victims of rape require sensitivity and confidentiality, and will usually require counselling and/or medical treatment. If a rape takes place, a sympathetic person of the same sex as the victim should immediately be assigned to comfort her or him. A doctor, if possible of the same sex, should examine the victim as soon as possible in case urgent treatment is necessary. This may include treatment for sexually transmitted diseases including HIV; the prevention of pregnancy; or treatment of injuries. The victims confidentiality should be respected. The police should be informed, if the victim consents, so that they may investigate the crime. Specialist counselling may be necessary seek medical advice and consult the victim about this. It will probably be necessary for the victim to be given immediate leave, to recuperate. The victim may wish to leave the area permanently, or to end their contract altogether. A senior manager should ensure that full support is given, and that a suitable agreement is reached on the staff members immediate future. Sexual assault and its aftermath can be a terrifying experience. Victims often react with a combination of fear, anger and shame and find it difficult to discuss the attack or seek help. If you are assaulted your options are likely to be: Passive resistance do or say anything to ruin the attackers desire to force sexual contact with you Active resistance shout for help; use an alarm; run away if there is somewhere safe to run to; or fight back furiously, such as with a knee to a mans groin Submit do this only if you sense your life is in danger. Survival becomes your objective. If you are assaulted, you will have to decide whether or not to report the crime. If you do, the police are likely to question you in detail about the event. Sometimes the police behave very professionally, treating the victim with dignity and respect. In other instances, the police may be less sensitive. You will need to have a medical examination before washing, in order to preserve evidence. Insist on being examined by a doctor or nurse of the same sex. Medical treatment may be necessary. You can ask a friend to go to the police with you many people find it helps not to be alone. Various reactions can happen. You may have nightmares or not be able to sleep. You may not want to eat. You may experience mood swings. You may feel guilty, have difficulty making decisions, or find that you cannot stand anyone touching you. Almost any reaction is normal, and it will take some time to recover. Remember that you are not alone. It usually helps to talk about it with a sympathetic person of the same gender: try to do this if you can. A shocking experience can upset anyone in this way. There is nothing to be ashamed about. It is not your fault, and you dont have to cope with it on your own. Help is available, so ask for any help you need. Witnesses of rape and sexual violence and colleagues of victims will also be affected and will need appropriate support. Counselling may also be helpful. The sympathetic support of close friends and/or colleagues will be essential. The team leader should ensure that such support, and specialist help where necessary, is provided. It may take a long time for the victim to recover fully. For more information on rape and sexual violence, see chapter 12 of Operational Security Management in Violent Environments. Robbery Robbery may XE "Robbery"  or may not be accompanied by violence. It can be a very frightening experience. If carried out on a person away from their home or workplace, it is sometimes known as mugging. Staff should take precautions to avoid robbery, for example by: Keeping to areas known to be low-risk Avoiding poorly lit or isolated places at night Avoiding going out alone Carrying an alarm XE "Alarms"  Carrying a radio If robbery is attempted, try to call for help by: Activating your alarm (if you have one) Calling for help on the radio even a one-word call may be enough to alert colleagues if there is no time to say more Shouting or screaming If you assess that it is safe to escape by running into a home, or by out-running your attackers, do so. If not, cooperate calmly with them by giving them what they ask for. Make no sudden movements. Do not risk injury in order to protect material possessions. As soon as the attack is over, move rapidly to a safe place and report the incident. Try to remember the details of your attackers appearance, to help the police to identify them. It can be helpful to keep your money in several different places on your person, such as two pockets and a wallet or purse, plus a money-belt. In this way you may be able to give the muggers the contents of only one pocket and a wallet or purse, for example, if the muggers do not notice the other places. It is good to limit the amount of cash you carry XE "Cash" . Robbery can also take place at the home or workplace. In this case, if you can lock the door before the robber is able to enter, do this provided that it is safe to do. Call for help and sound the alarm, if it is safe to do so. If the robber succeeds in entering the building, it is usually best to cooperate calmly by giving them what they ask for. Make no sudden movements. When they have left, secure the building or move to a safe place, and report the incident as soon as possible. Sexual harassment Sexual behaviour varies XE "Sexual harassment"  widely from culture to culture. (In one culture, for example, women who object to being harassed by strangers on the street may be punched and knocked down by them.) What is regarded as harassment in one society may be regarded as the norm in another. Humanitarian organisations should set a clear policy on what is considered to be harassment and let all staff know what this is, while encouraging their staff to be aware of the cultural context and to take appropriate precautions. Sexual harassment can be very distressing. If left unchecked it can lead to sexual violence. But even if it does not lead to violence, it is a serious issue in its own right, often causing both psychological and physical problems. It can be caused by a male or female harasser, and take many forms including: Constant invitations for drinks, dinner, dates Suggestive remarks Close physical contact Suggestive looks Uninvited visits to your home or hotel room Sexual gestures Pressure to engage in sexual activity Threat of, or actual assault If facing sexual harassment, take time to think about how you will respond. Options may include: Ignore the advance. In some cases, this may persuade the harasser to stop Confront the harasser. If you stop and politely ask, Were you speaking to me? this may embarrass the harasser into desisting. Tell the harasser directly that you do not like what he/she is doing, preferably in the presence of a witness. Get help, from a trusted friend, colleague or manager. It is entirely understandable if you do not wish to report the harassment, but it is helpful if it is reported immediately to a manager. If a manager is the harasser, a more senior manager should be informed instead. The manager should then take immediate steps to warn the harasser, and to protect the person being harassed. If the harasser is a member of staff, disciplinary action is likely to be appropriate. It may be appropriate to inform the police, if a crime has been or may have been committed. Counselling should be offered if necessary. If you do not wish to inform a manager, many organisations retain an independent counsellor, whom you may wish to speak to confidentially. He or she should be able to offer advice, or to direct you to appropriate advice and help. It is often helpful to keep a log of incidents, including dates, content of conversations, and witnesses. Do not leave this log at work, or anywhere where it may be found. Shooting See under Fighting above. Terrorism The word terrorism can be used in many XE "Terrorism"  ways, to cover a wide variety of incidents. For this reason it is usually more helpful to describe an incident in terms of what has actually happened. Has a bomb exploded? Was there shooting? Has a person been kidnapped? Then react to the event accordingly. It is, however, important to take account of the motive behind an incident, when deciding on how to react and how to protect staff against future incidents. In this sense, the terrorist nature of an incident may affect reactions and security measures. A humanitarian organisation may be the victim of a terrorist act by accident, or because it is perceived as associated with a government or group hostile to the terrorists. Terrorist motives may include: To gain publicity To provoke a reaction, for example by government or by security forces To change the behaviour of an organisation Weapon finds If you discover a weapon XE "Weapon finds" , or you are offered the chance to handle one, do not touch it. All kinds of firearms, guns, mines, grenades etc can fire or explode if not correctly handled by a trained person. There is also a risk of being trapped into adverse publicity: if you are photographed holding a gun, even if you were only holding it for a few seconds out of curiosity, you and your organisation could suffer damaging exposure in the press. Any weapons finds should be reported to the police or other appropriate authority. Security incidents and near misses: report format An agreed incident XE "Reporting"  XE "Near miss incidents"  XE "Incidents: near miss incidents"  report format helps to ensure a quick and effective response to a security incident. It provides the essential information in a logical order, allowing managers to make soundly-based decisions. It is important that an incident report states the facts and that any analysis or opinion is either clearly identified or left for the next stage of incident inquiry and analysis. Do not confuse fact and opinion. There are typically three types of incident report: Immediate incident report, sent the moment the incident begins or as soon as possible thereafter, often over the radio Follow-up incident report, giving more information as soon as this is possible Full incident report, sent after the incident is over. This is usually written. A common format for an immediate incident report is as follows: Who? who has the incident happened to? When? when did the incident happen? Where? where did the incident happen? What has happened? What have you done about it? What help do you need? In some cases there is no time to send all the above information for example if an ambush has just begun. In this case send whatever information you can there may only be time to shout Ambush! into the radio before you take evasive action. Even this is useful, and may allow your colleagues to avoid running into the same ambush, while taking steps to bring help to you. A follow-up incident report follows the same format as the immediate report, updating information as required, as soon as the situation allows. A full incident report gives a complete account of the incident, and may follow a format of this kind: Full chronological account of the incident Who was involved Reasons for any decisions taken Lessons to learn from the incident Identification of any failure of procedures or staff, and recommendations for any remedial or disciplinary action Date, author, role of author (involved in the incident or not?) and signature. These are important: unfortunately the date and authors name are often omitted by report-writers, which causes problems if there are any queries concerning the incident. A near miss incident in some cases will not require an immediate or follow-up incident report, but should always result in a full incident report so that lessons can be learned. Security manuals The aim of a security manual XE "Security manual"  XE "Manual (security manual)"  is to provide staff with an easy-to-use reference document, covering all common security advice, procedures and rules. A security manual is no substitute for training (teaching and practising staff in a skill until they can do it themselves); briefing (providing up-to-date information on a particular situation) or equipping. But it does form part of the essential equipment of well-managed humanitarian personnel. Organisations wishing to produce their own security manuals may wish to use existing security manuals for inspiration. In addition to this Generic Security Guide, the following documents are available in the public domain: Operational Security Management in Violent Environments by Koenraad Van Brabant published by the Overseas Development Institute (ODI) Humanitarian Practice Network as Good Practice Review No. 8. Available as free download from  HYPERLINK "http://www.odihpn.org" www.odihpn.org. Safety First: a field security handbook for NGO staff by Shaun Bickley, revised version published 2003 by Save the Children UK. Available from  HYPERLINK "http://www.plymbridge.com" www.plymbridge.com. Staying Alive, safety and security guidelines for humanitarian volunteers in conflict areas, by David Lloyd Roberts, published 1999 by ICRC. Available from  HYPERLINK "http://www.icrc.org" www.icrc.org. Landmines and Unexploded Ordnance, a resource book, 1999, Rae McGrath, Pluto Press. Available from  HYPERLINK "http://www.plutobooks.com" www.plutobooks.com. Security plan The aim of a security plan is to provide staff with a concise document which sets out the security rules and procedures applying to the location(s) where they are working. It must be short (many experienced field managers say it should be less than 10 pages), otherwise it is likely that some staff will not read it. It is vital that your security plan XE "Security plan"  is tailored to your particular circumstances, taking into account the local situation, the characteristics of your staff, and the results of your security assessment. There is no single format which will fit all situations. The security plan should be updated whenever necessary, for example when your assessment of the security situation changes. That said, many security plans contain some common features. The following suggested format contains some of these, and is offered as a memory-prompt to assist with writing a security plan. It should be adapted and added to as required by the circumstances. It could be dangerous simply to copy this format without adaptation, since it may not meet all the needs of a particular situation. Possible Format of a Security Plan Name of organisation: [enter name] Distribution: All staff Introduction Example of some text you might use: The aim of this security plan is to inform all staff of the location-specific security rules and procedures that apply to [name of the area]. It does not repeat generic security rules or procedures that are common to most operations in insecure locations. For those, please refer to [the organisations security manual or equivalent]. Every member of the team has a responsibility to promote security, and is required to follow all rules and procedures contained in this security plan. Failure to do so could endanger life, and is a disciplinary offence. The security plan is designed to help keep you and your colleagues safe, and to enable our work to run smoothly. The person overall in charge of security is [name]. Other staff with security-related responsibilities are [give their names and responsibilities]. The security plan will be updated as often as necessary. All staff are encouraged to contribute updates as the need arises through the person named above. This version was written/updated by [name] on [date]: all previous versions should be destroyed. Please read this plan immediately and keep it with you at all times. If you have any questions about it, or suggestions for improving it, please inform your manager or the team leader as soon as possible. You should have a copy of [the organisations generic security manual or equivalent]. You should also be familiar with the organisations security policy ask your manager for a copy. In an emergency Name the person or organisation to call in an emergency, together with their full contact details. Explain what to do if no communications are working or available. The security situation Short description of the local situation, identifying: The authorities, and other main groupings Significant historical and recent events The threats you assess XE "Threat"  to exist against humanitarian organisations and their staff. Ensure that you include any specific threats to national staff XE "National staff: threats to national staff" , or to women, or to other individuals or groups. [Note: this should only be a summary perhaps 3 or 4 paragraphs. Much fuller briefing on the local situation should be given to all staff before arrival, and on arrival, and updated regularly. But it would be a mistake to include a long analysis in the security plan, since the situation changes rapidly; the analysis could cause problems if read by local authorities; and it would make the security plan too long for many staff to read.] Security rules List here the security-related rules and procedures that apply to this area (location-specific rules and procedures). Do not include generic security rules and procedures that apply to almost all insecure areas, as these will make the security plan too long. Instead, make specific reference to the organisations security manual, stating that it should be read, understood and followed by all staff. Examples of location-specific rules and procedures may vary between XE "National staff: security plan"  international and national staff (if so, this should be made explicit). They might include: Behaviour: are there certain behaviours to adopt, or avoid, because of local culture? Law and custom: what local laws and customs should staff be aware of? Dress: are there some forms of dress XE "Dress"  that should be avoided, or adhered to, because of cultural or other issues? For example, are shorts unacceptable? Should any khaki or green items of clothing be avoided, to prevent them being mistaken for military uniform? Etc. Equipment: is there any equipment that staff should keep with them, or have available? E.g. torch/flashlight; first aid kit; passport or other papers; a quantity of money for emergencies, etc. Medical precautions: any location-specific medical precautions Locations: are there any places which are out of bounds, either at all times or at certain times (such as night-time, or religious festivals, etc)? Communications: Not a guide to radio use (which should be in the security manual) but procedures specific to this location e.g. whether staff are expected to be reachable by radio or mobile phone at all times; times of radio checks; radio channels that must be monitored; which communication means to use in an emergency. Travel: what are the location-specific procedures to follow when travelling XE "Travel: procedures" ? For example, are staff required to get permission from their manager, and/or from local authorities, before travelling? On the day of travel, whom should they inform, when, and how? Is any means of travel prohibited for security reasons? May staff travel alone? Locations of checkpoints, and how to handle them? How should they call for help if in trouble? What to do in the even of a vehicle accident? Etc. Night: any location-specific procedures for night-time Curfew: is a curfew in place? If so, what are the details? Shelter: XE "Shelters"  all staff should be familiar with the shelter in each building, to be used in case of attack Reaction to threats: if some types of threat are assessed as particularly likely, give the correct reaction procedures for these. In this case it may be helpful to repeat, in brief summary, a section of the security manual, and/or to refer explicitly to the relevant section. Medical facilities List here the medical facilities available, with full contact details and directions of how to find them. Include any necessary warnings about the shortcomings of those facilities. Medical evacuation (Medevac) Give the procedure for a medical evacuation. For example, are all staff entitled to medical evacuation, or only some? Who authorises it and how? What are the contact details for calling in the medical evacuation company (if you have one)? Evacuation for security reasons Explain the procedure for evacuation, should it become necessary for security reasons. Keep the procedure clear and concise. It might include: Who authorises an evacuation Assembly points Equipment to carry when evacuating Limits on amount of baggage when evacuating Likely evacuation routes Procedures when moving during an evacuation Communications procedures during an evacuation Arrangements for national staff Responsibilities of those remaining behind: Interim team leader Logistics and property Administration and finance All the above are likely to need written authorisations Other alternatives, e.g. reduction in staff or hibernation If for good reason the evacuation plan is lengthy, consider attaching it to the security plan as an annex. (See Annex 10 for suggested evacuation procedure.) Annexes to security plan A. Contact list Give here the full addresses, callsigns, frequencies and phone numbers of: All offices, accommodation and other buildings used by the organisation Police or other local security forces Relevant civil authorities Relevant military authorities, if appropriate B. Attach a map, with relevant locations marked (Note: The information in these attachments may be updated more often than the security plan so is easier to attach them as annexes, and replace them when necessary, rather than to incorporate them into the main body of the security plan.) Security policy A security policy is the top-level XE "Security policy"  document which describes the overall security policy of an organisation. It forms part of the hierarchy of key security documents, as follows: Security policy giving overall policy for the organisation Security manual giving generic procedures for the organisation Security plan giving detailed procedures for a specific location In the interests of clarity, there should be as little overlap as possible between these three types of document. A security policy should be tailored to the needs of the organisation. A suggested list of topics to cover is as follows: Principles The primacy of life over assets Approach and framework for security management Attitude to security risk how much is acceptable? Assessment of the threats against XE "Threat"  the organisation, at a global level Who should assess this, how often? How should this be communicated around the organisation? Roles and responsibilities of relevant managers for security matters. For example: The Chief Executive is overall responsible for security, as for the whole organisation. He or she delegates day-to-day security management to line managers at every level. The Security Advisor (if XE "Security advisor"  there is one) is not responsible for managing security but for providing security advice and support to line managers and staff, as requested. He or she also monitors the effectiveness of security management throughout the organisation and regularly reports this to the Board. Line managers at every level are responsible for the security of themselves and their staff All staff have a responsibility to ensure their own security and promote the security of colleagues The organisations security responsibilities to staff International Regional National making it clear that the organisation aims for the same standard of safety for all staff since they are of equal value Minimum requirements before deployment in a new geographical location (e.g. threat assessment, risk/benefits assessment, competence of the agency to fulfil operational demands and manage risk, assessment of material resource and staffing requirements for responsible security management, etc) The organisations security responsibilities to others when in the field: Supporters Volunteers Consultants Partners Required standards of preparation and precaution before travel to the field. This should be attached as an Annex to the policy, since it may need regular modification. The importance of nurturing a culture of security awareness and discipline throughout the organisation Requirements for monitoring the effectiveness of security management The organisations policy (giving overall principles only XE "Weapons" ) on: Security plans Kidnap and ransom XE "Ransom"  XE "Kidnap"  Weapons Evacuation Medical emergencies Incident reporting and analysis Serious or high-profile incidents (who is responsible for leading the crisis management team XE "Crisis management team" , and who else takes part in it?) Collaboration on security with other NGOs and UN agencies Contact with military forces, regular and irregular Armed guards Private security companies Evacuation Security training, equipping and briefing of staff and managers (Some of these points are better placed in an Annex to the policy rather than in the main body) The organisations approach to funding security measures, possibly including the role that it expects institutional donors to play Procedure for revising the security policy how often, and by whom? For further suggestions on the creation of a security policy, see People In Aids Policy Pot on Safety and Security, May 2003. Shelters The purpose of a shelter XE "Shelters"  is to protect staff in the event of an attack on the building, or if there is fighting or disorder nearby. Shelter design should depend on the local circumstances, and the nature of the possible threats. For example, if there is a significant possibility of stray mortar or artillery shells landing in the vicinity, the shelter should be protected against blast and shrapnel. If artillery and mortars are not a threat, then this kind of protection is unnecessary. If there is no significant threat of direct attack, and if the threat of local fighting or disorder is low, the designated shelter may simply be an inner room or corridor. It should either have no windows or the windows should be blocked off by an effective protection against stray bullets, such as sandbags. Points to bear in mind when designing a shelter may include: The impact of any obvious shelter construction on agency image, and the messages it may give to onlookers. For example, sandbags on the inside of a building have a lower profile than on the outside. No direct line of sight to windows Thick walls, able to stop a stray bullet (or blast and shrapnel, if they are assessed to be a significant threat). An alternative may be to have more than one wall between you and the outside if the walls are thick enough. Take specialist advice on the necessary thickness, if you are unsure. Suitable roofing, taking into account the assessed threats. For example, a threat of shelling, blast and shrapnel will require a different standard of roofing from a threat of falling spent bullets Lockable doors, either to the shelter or to the outside doors of the building in which the shelter is located Two exits Stock of water and food (to last 15 days or whatever period is assessed as more appropriate) Toilet facilities (improvised toilet facilities if no toilet is within the shelter) Power supply Fuel stock Lighting, including torches/flashlights and spare batteries, candles and matches Warm clothing Sleeping mats/mattresses and sleeping bags Communications equipment, battery chargers and spare batteries Maps Notebooks and pens For more detailed advice on constructing a shelter, see the ICRC booklet Staying Alive. Sitrep format It is helpful to staff and to managers if there is an agreed format XE "Sitreps"  XE "Reporting"  for routine situation reports (sitreps). An agreed format frees staff from the responsibility of creating a new format. It also helps managers and HQ to find the information they need, easily and quickly. Non-routine sitreps, such as an emergency sitrep on a new crisis, may adapt the format of the routine sitrep if appropriate or use a different format. The format for a routine sitrep will vary according to each organisations needs. A framework commonly used contains the following sequence: Local situation, including any changes in the situation of: Local population (divided into groups if necessary) Politics Local authorities Security, including actions of armed groups Local economy Humanitarian needs Action by humanitarian organisations The organisations own programme, listing for each project: Action taken in the reporting period* How that action compares with the action that was planned Successes Problems Administration, including: Personnel Finance Logistics Action requested From local manager From HQ From other parties * The reporting period is the period to which the sitrep relates. For example, a weekly sitrep may be dated 24 March, covering the period 16 to 23 March. The reporting period is therefore 16 to 23 March. Stress Stress is a risk XE "Stress"  to health, and to security. Managers and staff should aim to prevent stress, and should be alert for signs of it among their team. It affects different people, and people from different cultures, in widely varying ways. The points below are suggestions only, and should be selected and adapted according to the situation and culture. Causes of stress The causes of stress may include many things, such as: Personal loss Overwork, or high-pressure work environment Conflicting job demands Multiple supervisors Lack of clarity about responsibilities or expectations Job insecurity Trauma Mission failure Feeling overwhelmed by the scale of need around Human error Misunderstanding Illness Inter-personal difficulties Antagonism from authorities or XE "Local authorities"  local people Prevention of stress Stress can often be prevented by taking a few simple precautions, including: Realistic work plans and working hours Clear briefing Efficient, caring management Listening regularly to staff, particularly when they are under pressure Keeping staff fully informed Encouraging staff and praising them for good work Rapid resolution of any grievances or complaints Sufficient rest, including a weekly day off in all but the most acute emergencies, and enforced Rest and Recreation (R&R see Annex 25) in periods of high pressure Enabling staff to see their families and/or phone home Efficient mail service, and private access to personal e-mail, where possible Privacy in living accommodation Little luxuries, such as books, magazines, videos, good quality soap Eating properly, with a variety of menus Building team spirit Friendships Exercise Recognition, praise and reward for good work Adequate pay Secure home environment Signs of stress Managers and staff should look out for signs of stress in themselves and among their colleagues. Common signs include: Uncharacteristic or erratic behaviour Talking much more or much less than normal Irritable moods or short-tempered outbursts Headaches Depression or anxiety Apathy Unexplained aches and pains Skin problems Overwork Disregard for security, risky behaviour Indecisiveness, inconsistency Reduced efficiency at work Inability to concentrate Frequent absence from work Recurrent minor illnesses Disillusionment with work Extended fatigue Disrupted sleep or oversleeping Over- or under-eating Overuse of alcohol or use of drugs Treating stress A doctor or trained person will advise on treating stress. Debriefing should be done by a trained person if possible. In the absence of a trained person, the following tips are often found helpful, but the appropriate action may vary widely according to the individual and the culture: Take time to talk with the person suffering stress. Encourage them to express how they are feeling. Reassure and encourage them. Allay or deal with any worries they may have. Find out if they would benefit from any changes to work practices. Do they need more help with their tasks? Are there other pressures on them, for example bad news from home? Enable the person suffering stress to take time out from high-pressure work, but not to stop work completely. Suggest useful tasks that they can do, which are not stressful. This can help them to feel useful and valued, and can be part of the treatment process. Ensure they have access to recreational or religious facilities, and counselling if desired Encourage them to look after themselves: eating well, taking exercise, frequent rest, etc Keep talking with them regularly or ensure that a sympathetic colleague does so After a short while, depending on the circumstances, it is often possible for them to resume their normal work. Indeed returning to work, after a sensible pause and without overloading them, can help recovery. Continue to monitor them and to listen to how they are getting on If they do not respond, or if they are not able to return to work, seek medical advice Traumatic stress Any event which is very distressing and outside the realm of normal human experience can result in traumatic stress. Traumatic stress usually produces a very intense response, including fear and/or helplessness, which may overwhelm the individuals coping mechanisms. Such a response is a normal reaction to an abnormal situation. It does not necessarily indicate that the person has developed a psychiatric disorder. Nonetheless, such exposure can lead to the development of post-traumatic stress disorder. Traumatic stress is brought on by exposure to emotionally powerful events or "critical incidents". The event may be sudden and unexpected or ongoing in nature. Some staff may experience vicarious or indirect trauma through witnessing trauma or violence, or being associated with a tragic event such as acute disaster recovery efforts. Others may experience compassion fatigue as a result of exposure to human suffering or tragic situations that are more chronic and long-term. In many cases, the symptoms of vicarious trauma or compassion fatigue resemble those of victims experiencing direct trauma. Individuals with a prior history of significant trauma, instability in current life circumstances, or other vulnerabilities may be at highest risk. Regardless of the source, traumatic stress may be one of the more serious occupation hazards experienced by staff, both in the field and in HQ. Dealing with traumatic stress is a specialist area and requires professional attention. Burnout Burnout is often used to describe a person who has become exhausted. Some signs of burnout are similar to the signs of stress, though are likely to be more severe. Signs of burnout within a team may include high turnover of staff; lack of team unity; a culture of blame; an unwillingness to take the initiative; increased sick leave; and decreasing effectiveness. Managers should watch out for these signs, and take action accordingly. Best of all, they should put in place working practices which prevent stress and burnout from occurring. For further information see Managing the Stress of Humanitarian Emergencies, a UNHCR guide, by Sheila Platt. Also see Humanitarian Action and Armed Conflict: Coping with Stress, by Barthold Bierens de Haan, published by the ICRC. The Finnish Red Cross has also published Security, Health and Stress in the Field, by Hamberg-Dardel and Quick. Syllabus for a basic security training course Organisations should assess the specific security training needs of their staff XE "Training: for field staff"  XE "Syllabus: for field staff" , and ensure that the training syllabus is designed to meet those needs. The following syllabus lists a number of topics that are likely to be required in most basic security training courses. The list is not exhaustive. Introductory topics Humanitarian principles Basic outline of the humanitarian system Red Cross/NGOs Code of Conduct XE "Code of Conduct"  Cultural and context awareness Dress and behaviour Personal equipment The organisation Mission Mandate History Values Security-specific topics Assessing risks Precautions at home and office Precautions when travelling Map reading Armed checkpoints Reacting to security incidents Evacuation Dealing with the military Dealing with rebel/irregular troops Basic tips on dealing with the media Communications Radio handling Handling satellite phone XE "Telecommunications" , fax, e-mail Reporting Vehicles Driving a 4-wheel drive vehicle Tips for safe driving Equipment that every vehicle should carry Basic vehicle checks and procedures Medical Health and hygiene in the field Handling stress XE "Stress" , including in a team context Medical evacuation For advice on designing and delivering a security training course, you may wish to contact a recognised security training organisation. A number of these are listed in the Security Training Directory XE "Security Training Directory"  which accompanies this Guide. Syllabus for a security course for field managers Organisations should assess the specific security training needs of their field managers XE "Training: for field managers"  XE "Syllabus: for field managers"  XE "Managers: training" , and ensure that the training syllabus is designed to meet those needs. The following syllabus lists a number of topics that are likely to be required. The list is not exhaustive. Approaches to security: acceptance, protection, deterrence Security-related responsibilities of a field manager Team leadership People-management Security assessments, including understanding the local context, influential actors and threats XE "Threat: training" , assessing the implications of political and security developments Analysing the risks and likely benefits of a programme Writing a security plan Giving a security briefing Writing sitreps and incident reports Security coordination with other agencies Common security problems and dilemmas Deciding on and managing an evacuation Organising security training/workshops for staff Winning acceptance among staff, local leaders and people Dealing with senior civil leaders, police and/or military commanders Handling the media Serious incidents: kidnapping, assault, rape, murder etc Securing buildings Managing communications XE "Telecommunications"  Security aspects of administration: Human resources aspects of security management: recruitment, contracts, briefing, discipline, termination of contracts etc Financial security Security of property, inventory management etc Stress: prevention and treatment The UN Security Management System Threat Impact Chart A helpful way of considering threats XE "Threat impact chart" , their relative likelihood, and their impact if they occurred is to plot them on a chart. List the threats you assess XE "Threat"  to be present, with the likelihood of each threat occurring, and the impact that it would have if it did occur, on a scale of 1 to 5. For example, murder would have very great impact, so should be rated as 5, though its likelihood may be rated as low say, 1. Threat EventProbability 0-5Impact 0-5 Now plot each threat as a point on the chart below. It gives you a picture of your assessed threats. Those nearer the top right corner should give most cause for concern.  A few threats are marked on the following chart, to illustrate the method:  The curved lines represent thresholds of risk. The threshold of acceptable risk varies according to what you expect to achieve. To save life you would normally be prepared to take greater risks than if you were simply carrying out routine work. It is for you and the responsible manager to decide what level of risk is acceptable. If any threats lie beyond the threshold of acceptable risk, action is required either to remove the threat, or to remove staff from the threat. Travel authorisation format It can help efficiency XE "Travel: authorisation format"  and security to require staff to complete a simple travel authorisation form, before going on a journey. This helps to ensure that the trip is well planned, safely managed and that other relevant colleagues know any necessary details. A travel authorisation form may need to be adapted to the local circumstances but often includes the following basic elements XE "Driving" : Names of people planning to travel Purpose of the trip Destination Route Estimated time of departure Estimated time of arrival Any threats assessed to be relevant to the trip Communications arrangements including frequencies, callsigns, phone numbers and reporting times Signature of authorising manager UN security procedures In many emergencies, UN agencies play XE "United Nations: security system"  XE "United Nations: security procedures"  a leading role in security management. Many NGOs cooperate with the UN on security matters, exchanging information and informing each other of security plans. It is therefore helpful for all humanitarian organisations to be aware of the UN security system. Structure The UN security system typically has the following components on the ground during an emergency: Designated Official. In each country XE "United Nations: Designated Official (DO) for Security"  XE "Designated Official (DO) for Security (UN)"  the UN Secretary-General appoints a senior official, normally the UN Resident Coordinator, as the Designated Official for Security (DO). The DO is responsible for ensuring the safety and security of UN personnel within that country. He or she reports to the UN Secretary-General, through the UN XE "United Nations: Security Coordinator (UNSECOORD)"  Security Coordinator (UNSECOORD). The DO prepares a security plan for the country, and grants security clearance for UN staff and their dependants to enter the country if a UN security phase is in effect. The Security Management Team (SMT), a committee chaired XE "United Nations: Security Management Team"  XE "Security Management Team (UN)"  by the DO which usually includes the heads of the operational UN agencies, meets regularly to discuss security management, and advise the DO. Area Coordinators. In some larger countries, the DO and SMT may appoint Area Coordinators who coordinate security arrangements for a particular area which may be distant from the capital city. Such areas usually have their own Area SMT. Security Officers. There are likely to be: One or more security officials, usually known as Field Security Coordination Officers, employed by UNSECOORD XE "United Nations: Security Coordinator (UNSECOORD)" . They assist the DO, particularly by keeping staff and dependants informed on security matters, advising on security measures, and coordinating UN responses to crises. One or more Field Security Coordination Assistants, locally recruited staff members who assist the Field Security Coordination Officers. UN agencies present on the ground may employ their own Field Security Officers, sometimes known as single-agency security officers. They advise and assist the country representative of their agency on security matters. Communications networks XE "Telecommunications" . In addition to its internal channels, a UN operational agency may make one or two radio channels available to all humanitarian organisations, to improve coordination XE "Security coordination"  XE "Coordination on security"  and security. Wardens, XE "Wardens"  who act as information conduits to UN staff on security matters, and ensure implementation of the UN security plan in their zone of responsibility Minimum Operating Security Standards (MOSS). These set out XE "United Nations: Minimum Operating Security Standards"  XE "Minimum Operating Security Standards (UN)"  the minimum security measures which any UN agency must put in place in order to be allowed to work in a particular country. They include equipment, procedures and documentation. A country-specific MOSS is developed for each country, using the baseline MOSS produced by UNSECOORD XE "United Nations: Security Coordinator (UNSECOORD)" . In the case of a UN peacekeeping or special mission, the Special Representative of the Secretary-General (SRSG), and/or the Force Commander or Chief of Staff, are responsible for the security of its military and civilian personnel. At UN HQ XE "United Nations: Security Coordinator (UNSECOORD)"  in New York, UNSECOORD is responsible for all policy and procedural matters related to security, and ensuring that each UN field operation has adequate security measures in place. UNSECOORD, on behalf of the UN Secretary-General, decides whether relocation or evacuation is necessary in situations of insecurity, taking into account information and advice provided by UN staff in the field. The HQ of each UN organisation appoints a security focal point at HQ, who manages security within that organisation and liaises with UNSECOORD and other agencies. On the ground, normally the head of each UN agency present is a member of the SMT. UN security phases XE "United Nations: security phases"  XE "Security phases (UN)"  The UN operates a system of five security phases, each denoting a different level of insecurity, and requiring different security measures: Phase One: Precautionary Exercise caution All travel into XE "Travel: procedures"  the area requires advance clearance by the Designated Official (DO) Phase Two: Restricted Movement Staff and families remain at home No travel into or within the country unless authorised by the DO Phase Three: Relocation Internationally-recruited staff and their families are temporarily concentrated or relocated to specified sites/locations and/or Eligible dependants are relocated outside the country According to the local UN security plan and the decision of the DO/Country Director, locally recruited staff may: Leave the duty station on special leave with pay, or Be relocated to a safe area within the country with up to 20 days Daily Subsistence Allowance (DSA), and Receive up to 3 months salary advance and, if needed, a grant to cover transport costs for themselves and eligible dependants Phase Four: Programme suspension All internationally-recruited staff who are not directly concerned with emergency or humanitarian relief operations or security matters are relocated outside the country Locally-recruited staff: as for Phase Three Phase Five: Evacuation This requires the approval of the UN Secretary-General All remaining internationally-recruited staff leave Locally-recruited staff: as for Phase Three Security coordination with other organisations Other humanitarian organisations often look to XE "Security coordination"  XE "Coordination on security"  the UN Security System for security-related information and informal coordination. In many cases, the UN hosts a regular security coordination meeting to which other humanitarian organisations are invited. Often, the UN makes available one or more radio channels to the wider humanitarian community, to allow all organisations to communicate easily on security matters or in case of urgent need. A security briefing may also be given as part of the agenda of general humanitarian coordination meetings. This briefing is typically given either by a UN security official or by an officer of an international peacekeeping force, if present. Annex 41 sets out a Menu XE "United Nations: Menu of Options"  XE "Menu of Options for UN-NGO Security Collaboration"  of Options for security collaboration between the UN and NGOs, as agreed by the UN Inter Agency Standing Committee (IASC). Inclusion of other organisations in UN security arrangements In general, the UN is not responsible for the security of any other organisation. But in 1996 the UN published a directive on the inclusion of international staff of intergovernmental organisations and NGOs (those who are implementing partners of the UN) in UN security arrangements. An implementing partner interested in the inclusion of its international staff in UN security arrangements at a particular duty station should submit its request to the UN Designated Official (DO) for security at that duty station. If the DO agrees, he or she will prepare a draft Memorandum XE "United Nations: Memorandum of Understanding"  XE "Memorandum of Understanding (UN)"  of Understanding between the UN and the implementing partner, using the model Memorandum of Understanding provided by UNSECOORD XE "United Nations: Security Coordinator (UNSECOORD)" . The implementing partner must agree to share the cost of any security arrangements, including evacuation costs. It must also agree to: Consult with and assist the DO on all matters relating to security arrangements Fully follow the instructions of the DO regarding security matters Ensure that the DO is provided with updated lists of names and addresses of international staff Report all incidents with security implications to the DO Lend travel assistance to UN personnel, where possible And certain other requirements. UN-NGO Security Collaboration: Menu of Options At a UN XE "United Nations: security system"  XE "United Nations: Inter-Agency Standing Committee (IASC)"  XE "Inter-Agency Standing Committee (IASC)"  Inter-Agency Standing Committee (IASC) taskforce on staff security in 2001, endorsed by the IASC Working Group in January 2002, the following was agreed. It is known as the XE "United Nations: Menu of Options"  XE "Menu of Options for UN-NGO Security Collaboration"  Menu of Options for UN-NGO security collaboration. Non-UN organizations are not bound by, nor participate formally in, Security Management Team (SMT) decisions on UN XE "United Nations: Security Management Team"  XE "Security Management Team (UN)"  security policy. However, UN organizations and their IGO/NGO partners in specific humanitarian operations should agree on practical collaboration fitting the specific field situation. This would include choosing, according to the agencys or organizations mandate/mission and the scope of their operational involvement, the degree to which they would commit themselves to participate in the following: Selecting IGO/NGO field security focal point(s): IGO/NGO partners to UN organizations select among themselves one or a limited number of field security focal points. Convening broad-based fora for field security collaboration at regular intervals among all humanitarian actors at area, country and sub-office level in order to address practical security issues of common concern. These would normally include: the DO, Field Security Officer (FSO), Area Security Coordinator or other DO designee; members of the SMT as appropriate; NGO field security focal point(s); representatives of IGOs; representatives of the Red Cross Movement. The chairperson may be chosen on a rotating basis. Including staff security concerns in Consolidated Appeals (CAPs): the CAP may XE "United Nations: Consolidated Appeals (CAPs)"  include a project to cover the additional resources potentially required by enhanced collaboration on staff security by agencies and organizations represented in the taskforce such as telecommunications and training XE "Training: funding within the UN" . Meeting common, security-related needs: UN organizations and their IGO/NGO partners committed to security collaboration participate, to the extent feasible, in meeting the uncovered, security-related needs of the humanitarian community, including costs, according to the scope of their respective involvement. Sharing resources: UN organizations and their IGO/NGO partners cooperating in humanitarian field operations develop a local inventory for the sharing of their specialized, security-related human and material resources. Facilitating inter-agency telecommunications XE "Telecommunications"  among UN organizations and their IGO/NGO partners at field level by: The DO advocating with the relevant authorities for the use of telecommunication equipment within the framework of existing international agreements; The relevant UN body negotiating with the authorities a common frequency for security collaboration for UN organizations and their IGO/NGO partners operating in the same area; Humanitarian actors committed to security collaboration using standard communication procedures and, to the extent possible, providing staff with compatible communication systems. Collaborating and XE "Training: UN/IGO/NGO collaboration"  consulting in security training: all UN organizations and their IGO/NGO partners (at HQ and at field level) carry out security training in collaboration and/or consultation with other agencies to the extent possible, and seek to increase their own capacity for security training at all levels. Sharing information: XE "Information: information sharing"  security-related information is shared among UN organizations and their IGO/NGO partners while respecting the humanitarian character of the participants as well as the confidentiality required when dealing with sensitive information XE "Sensitive information" . Identifying minimum security standards: UN organizations and their IGO/NGO partners jointly identify and agree how to apply minimum security standards adapted to local circumstances taking into consideration already existing standards including, for example, the UN MOSS XE "United Nations: Minimum Operating Security Standards"  XE "Minimum Operating Security Standards (UN)"  that are binding for the members of the UN system. Seeking adherence to common humanitarian ground-rules: the security collaboration of UN organizations and their IGO/NGO partners in specific field operations, to the extent possible, rest on respect for common, locally developed ground-rules for humanitarian action. Vehicle equipment If properly maintained XE "Vehicles: vehicle equipment"  and equipped, vehicles are less likely to break down, and are more easy to recover if they do break down. It is good practice for a field operation to establish a standard equipment list for vehicles, appropriate to the local circumstances, and then to ensure that all vehicles have this equipment at all times. This is a security issue, since a vehicle which breaks down in a dangerous area puts its occupants at risk. The right equipment will vary, depending on the circumstances. Select from, add to or subtract from the following list: Two spare wheels (one is not sufficient in difficult or dangerous areas) Jerrycan of water (20 litres) Jerrycan of spare fuel (20 litres) Jack, wheel brace and any other tools for changing a wheel Tow-rope First aid kit (a large first aid kit (suitcase-size) may be necessary in some areas) Spare light bulbs Torch/flashlight and spare batteries Spare engine oil Snow chains Ice scraper Sand plates VHF radio HF radio Communications information: contact lists, frequencies etc Winch Front nudge bar Snorkel Fire extinguisher Locking wheel nuts Spanners Screwdriver Spare fuses Map Compass Warning triangle Identifying markings or flag Vehicle documents including: Ownership documents Authorisation documents Insurance certificate Vehicle logbook (for recording journeys made): to include columns for date, start location, time of departure, kilometre reading at departure, destination, time of arrival, kilometre reading at destination, purpose of trip, name of driver, signature Vehicle manual Blankets Food (if travelling on long journeys, or if delays are possible) Armoured XE "Vehicles: armoured vehicles"  vehicles are used by a few humanitarian organisations, in rare circumstances. Most humanitarian organisations take the view that if the security situation is such that armoured vehicles are necessary, then it is too dangerous to be working there at all. Note that armoured vehicles do not give protection against some weapons, including anti-tank mines, armour-piercing bullets, anti-tank grenades and missiles, and direct hits from shells. They are expensive, heavy and require special training to drive.  XE "Staff:training" \t "See Training"   XE "Hostages" \t "See Kidnap"  XE "Staff:national staff" \t "See National staff"  XE "Health" \t "See Medical"  XE "Accounting" \t "See Financial security"  XE "Security incidents" \t "See Incidents"  XE "Handbook" \t "See Manual"  XE "Policy" \t "See Security policy"  XE "Plan" \t "See Security plan"  XE "Women" \t "See Female staff"  XE "Mugging" \t "See Robbery"  XE "Guns" \t "See Weapons"  XE "Assessment" \t "See Security assessment"  XE "Clothing" \t "See Dress"  XE "Flak jacket" \t "See Body armour"  XE "Cars" \t "See Vehicles"  XE "Briefing" \t "See Security Briefing"  XE "Training:directory" \t "See Security Training Directory"  INDEX To jump to the page number you want, use the Go To function. Click on Edit, then Go To, or hold down Ctrl and press G. In addition to the Index and the Table of Contents, you can search for words or phrases using the Find feature in Word. Click on Edit, then Find, or hold down Ctrl and press F.  INDEX \e " " \h "A" \c "2" \z "2057"  A Abbreviations 39 Acceptance approach to security 4 Accidents 25, 48, 69, 77 Accommodation 42 fire precautions 55 first aid kits 59 generators 71 guards 23 location and type 11 locking doors 20 R&R accommodation 72 Accounting See Financial security Advocacy for humanitarian space 34 Air attack 78 Air crash 79 Alarms 20, 42, 49, 50, 55, 57, 92, 93 Ambush 21, 43, 79, 85 Amnesty International 64 ANSO (Afghanistan NGO Security Office) 15, 18, 39 Archives 32, 35 Arrest 81 Assault 82 Assessment See Security assessment Audit 53 B Bank 53, 54 Behaviour of staff 19 Bioforce 37 Biological attack 84 Blast film 83 Blood group 10, 12 Body armour 49 Bombs 42, 82, 83 Booby traps 91 Bribes 24, 45 Briefing See Security Briefing Buildings 11, 42 C Cars See Vehicles Cash 10, 19, 51, 53, 71, 94 Casualties 34, 37, 77, 78, 83, 88 Checkpoints 21, 43 Chemical attack 84 Civil-military relations 14, 15, 35, 44, 46, 58, 87 Clothing See Dress Code of Conduct 5, 7, 19, 20, 32, 35, 38, 103 Codes and Standards 35 Communications security 70 Computer security 60 Contingency plans 18, 34 Contracts 9, 10 during evacuation 30, 51 ending contracts 31 standard contracts 8, 11 Convoys 44 Coordination on security 15, 17, 108 Copyright of this Guide 39 Corruption 24, 45 Crime 4, 19, 20, 77 Crisis management team 33, 34, 89, 90, 99 Crowds 84 Cultural awareness 47 D Death of staff member 28 Debriefing after an evacuation 30 after end of contract 69 after hijack 89 after programme closure 32 Designated Official (DO) for Security (UN) 107 Detention 81 Deterrence approach to security 5 Directors of a humanitarian organisation 3 Discipline 19, 20, 21, 35 Donors 14, 17, 25, 35, 54, 65 Dress 20, 21, 92, 98 Driving 48, 107 Drugs 20, 92 Duress codes 72 Duty officer 22, 35 E Earthquake 42, 84 ECHO ii, 39, 40 Embassies 17, 29, 52 Emergency contact card 11, 24, 49 Employment laws and disputes 8, 9, 31 Equal opportunity 8 Equipment general 10 personal 49 team 50 Evacuation 28, 51 Evaluation 19, 32, 37 Explosions 85 F Farewell events 32 Fatal incidents 28 Female staff 20, 47 Field-Headquarters relationship 18 Fighting 84 Financial security 10, 23, 53, 86 accounting records 10, 23, 35, 51, 86 need for accountant from outset 11, 23, 53 Fire safety 23, 55 First aid 19, 91 kits 12, 59 training 12 Flak jacket See Body armour Flood 86 Framework Partnership Agreement (ECHO) 26 Fraud 86 G Generators 43, 50, 71, 72, 86 Get-you-in team 24 Grenade 87 Guards 23, 56 Guns See Weapons H Handbook See Manual Handover 32 Headquarters aspects of security 33 Health See Medical Hibernation 28 Hijack aircraft 88 vehicles 87 HIV/AIDS 59 Hostages See Kidnap Hotels security precautions 20, 55 Human Resources management security aspects 34 Human rights abuses 26, 64 Human Rights Watch 64 Humanitarian Information Centres (HICs) 75 Humanitarian space 7, 34 Hygiene 59 I Identity badges 24 Illiterate staff 10 Improvised Explosive Devices (IEDs) 82 Incidents 27, 77 high-profile incidents 34 incident analysis 27 incident reports 27 near miss incidents 27, 95 serious incidents 28, 34 Information information gathering 13 information security 23 information sharing 13, 15, 18, 111 Insurance 10, 12, 23, 28, 34, 62 Integrated Regional Information Network (IRIN) 75 InterAction Field Cooperation Protocol 36 Inter-Agency Standing Committee (IASC) 35, 110 International Committee of the Red Cross (ICRC) 26, 63 International Crisis Group 75 International Humanitarian Law 34, 63 International military forces 15 International police 16 Inventory control 10, 64 J Job descriptions 8 K Keys 24 Kidnap 34, 82, 89, 99 L Legal aspects of employment 8, 9, 31 Legal aspects of programme closure 31 Legal protection of aid workers 26 Legal risks 3, 34 Local authorities 14, 18, 29, 30, 101 Local NGOs 17 Local partners 17 Local population 4, 8, 13, 29, 35, 45, 52 Local security forces 14 Locks 24 Looting 52, 91 M Managers 2, 3, 33 senior managers 3, 9, 13, 32, 33, 34, 78 training 37, 104 Manual (financial manual) 54 Manual (security manual) 2, 3, 5, 7, 33, 96 Mass casualties 34, 37 Media 25, 65 after a security incident 28 during programme closure 32 during suspension, evacuation, etc 30 Medical emergency 27, 66 evacuation (Medevac) 49, 66, 91 health and hygiene 12, 59 preparation 12 Memorandum of Understanding (UN) 30, 109 Menu of Options for UN-NGO Security Collaboration 35, 109, 110 Military assets 16 Military forces international 15 local 14 Mine Risk Education (MRE) 39, 91 Mines 63, 91 Minimum Operating Security Standards (UN) 108, 111 Mugging See Robbery N National staff 1, 53, 76 evacuation 30, 51, 52, 60 information-gathering 13 insurance 62 recruitment 8 security plan 97 stress 45 threats to national staff 97 Near miss incidents 27, 95 Negotiation 4, 7, 44, 89 Next of Kin informing Next of Kin 28, 67, 82 Next of Kin records 10, 67 O Offices 11, 37, 42 P Partners 26 People In Aid Code 36, 69 Personnel records 10 Phonetic alphabet 71 Plan See Security plan Police international 16 local 14, 18, 27, 42, 44, 45, 58 Policy See Security policy Post-traumatic stress disorder 27 Preparation for the field 6 Private security companies 17, 23, 56 Procurement 24, 46 Programme design security aspects 8, 19 Property disposing of 32 Protection approach to security 4 R Radio procedures 61, 70 Radiological attack 84 Ransom 34, 82, 89, 99 Rape 4, 92 Recruitment 8, 10, 56, 74 RedR 37 Refoulement 63 ReliefWeb 75 Relocation 28, 51 Reporting 18, 27, 95, 101 Rest and Recreation (R&R) 21, 72 Risk 1, 2, 5 Robbery 57, 93 S Safe 42, 50, 53 Satellite phones 22, 61 Security definition 4 Security advisor 3, 15, 18, 33, 99 Security assessment 6, 13, 30, 73 Security briefing 2, 9, 76 Security coordination 15, 17, 108 Security forces international 15 local 14 Security incidents See Incidents Security Management Team (UN) 107, 110 Security manual 2, 3, 5, 7, 33, 96 Security phases (UN) 108 Security plan 5, 7, 13, 33, 97 Security policy 5, 33, 99 Security Training Directory 1, 3, 9, 37, 104 Sensitive documents 10, 32, 44, 51 Sensitive information 22, 23, 24, 36, 60, 61, 72, 111 Sexual harassment 94 Sexual violence 92 Shelters 42, 85, 98, 100 Shooting 85 Sitreps 18, 101 Software 11, 22, 39 Sphere project 36 Staff ending contracts 31 female staff 20, 21, 47 illiterate staff 10 importance of quality staff 8, 34 national staff See National staff relocation or reduction 29 staff behaviour 19 training See Training use of experienced staff 37 Standard contracts 8, 11 Standard documents 11 Standard Operating Procedures (SOPs) 33 Standards and Codes 35 Stress 9, 21, 27, 72, 101, 103 Suspension of a programme 29 Syllabus for field managers 104 for field staff 9, 103 T Teamwork 19 Telecommunications 10, 20, 22, 70, 103, 104, 108, 110 Terrorism 73, 94 Theft 4, 5, 10, 20, 23, 28, 43, 53, 56, 64, 84, 86 Threat 2, 5, 26, 97, 99, 105 assessing threats 27, 73 bomb threats 83 bribes and threats 24 briefing on threats 76 resulting from evacuation 29 threats caused by rumours 65 threats from military forces 61 threats to female staff 20 threats to visitors 2 training 9, 37, 104 Threat impact chart 105 Training 1, 2, 9, 34, 37 administration of 11 directory See Security Training Directory fire safety 55 first aid 59 for field managers 104 for field staff 9, 103 for HQ managers 37 funding within the UN 110 guards 57 insurance requirements 62 sharing training 17 trainers 37 training policy 33 UN/IGO/NGO collaboration 110 Travel 25 authorisation format 107 decision to travel 79, 87 procedures 98, 108 varying route and time 54 U United Nations Consolidated Appeals (CAPs) 110 Designated Official (DO) for Security 107 Humanitarian Information Centres (HICs) 75 Integrated Regional Information Network (IRIN) 75 Inter-Agency Standing Committee (IASC) 35, 110 Memorandum of Understanding 30, 109 Menu of Options 35, 109, 110 Minimum Operating Security Standards 108, 111 role in evacuation 30 Security Coordinator (UNSECOORD) 35, 107, 108, 109 Security Management Team 107, 110 security phases 108 security procedures 107 security system 15, 35, 107, 110 United Nations High Commissioner for Human Rights (UNHCHR) 64 V Vehicles 22 armoured vehicles 23, 79, 88, 112 vehicle equipment 111 vehicle hijack 87 Visibility 25 Visitors access 20, 24 emergency contact card 24, 49 instructions for guards 56 threats to 2 waiting area 43 W War crimes records 23 reporting 26, 64 War risks insurance 62 Wardens 51, 86, 108 Warehouses 42 Weapon finds 95 Weapons 5, 21, 23, 58, 63, 82, 99 Whistle-blowing 46 Women See Female staff    Humanitarian principles are summarised in the Code of Conduct XE "Code of Conduct"  for the International Red Cross and Red Crescent Movement and NGOs in Disaster Relief, available at  HYPERLINK "http://www.ifrc.org/publicat/conduct/code.asp" http://www.ifrc.org/publicat/conduct/code.asp.  Available at  HYPERLINK "http://www.ifrc.org/publicat/conduct/code.asp" http://www.ifrc.org/publicat/conduct/code.asp.  Guidelines on the use of military and civil defence assets to support United Nations humanitarian activities in complex emergencies, UN, March 2003, available online at  HYPERLINK "http://ochaonline.un.org/DocView.asp?DocID=426" http://ochaonline.un.org/DocView.asp?DocID=426 or using a search engine.  Available at  HYPERLINK "http://www.ifrc.org/publicat/conduct/code.asp" http://www.ifrc.org/publicat/conduct/code.asp.  Available at  HYPERLINK "http://www.ifrc.org/publicat/conduct/code.asp" http://www.ifrc.org/publicat/conduct/code.asp.  Adapted from UNSECOORD/UNHCR Security Awareness An Aide-Mmoire, 1995  Ex ante and ex post publication.  Available at  HYPERLINK "http://www.icrc.org" www.icrc.org.  Available at  HYPERLINK "http://www.un.org/law/cod/safety.htm" http://www.un.org/law/cod/safety.htm.  Available at  HYPERLINK "http://www.ifrc.org/publicat/conduct/code.asp" http://www.ifrc.org/publicat/conduct/code.asp.  Available at  HYPERLINK "http://www.ifrc.org/publicat/conduct/code.asp" http://www.ifrc.org/publicat/conduct/code.asp.  Available at  HYPERLINK "http://www.peopleinaid.org" www.peopleinaid.org.   HYPERLINK "http://www.sphereproject.org" www.sphereproject.org.  Available at  HYPERLINK "http://www.interaction.org/disaster/NGO_field.html" http://www.interaction.org/disaster/NGO_field.html.  Available at  HYPERLINK "http://www.ifrc.org/publicat/conduct/code.asp" http://www.ifrc.org/publicat/conduct/code.asp.  Oxford University Press, 2002, available from bookshops or from  HYPERLINK "http://www.amazon.com" www.amazon.com.  Sheldon Press, 2002, available from bookshops or from  HYPERLINK "http://www.amazon.com" www.amazon.com.  Adapted from Annex 6 of K. Van Brabant (2000) Operational Security Management in Violent Environments published by ODI Humanitarian Practice Network as Good Practice Review No. 8. Available as free download from  HYPERLINK "http://www.odihpn.org" www.odihpn.org.  S. Davidson and J. Neal (1998). Available as a free download from  HYPERLINK "http://www.peopleinaid.org" www.peopleinaid.org.  Source: UNHCR. There are some exceptions to this rule. For more information, see UNHCRs website at  HYPERLINK "http://www.unhcr.ch" www.unhcr.ch.  Available at  HYPERLINK "http://www.peopleinaid.org" www.peopleinaid.org.  Source: Safety First: a field security handbook for NGO staff by Shaun Bickley, revised version published 2003 by Save the Children UK. Available from  HYPERLINK "http://www.plymbridge.com" www.plymbridge.com.  See RoSPA website at  HYPERLINK "http://www.rospa.com/CMS/index.asp" http://www.rospa.com/CMS/index.asp.  Available in two parts at  HYPERLINK "http://www.homeoffice.gov.uk/docs/bombs.pdf" www.homeoffice.gov.uk/docs/bombs.pdf and  HYPERLINK "http://www.homeoffice.gov.uk/docs/bombs2.pdf" www.homeoffice.gov.uk/docs/bombs2.pdf.  Available in two parts at  HYPERLINK "http://www.homeoffice.gov.uk/docs/bombs.pdf" www.homeoffice.gov.uk/docs/bombs.pdf and  HYPERLINK "http://www.homeoffice.gov.uk/docs/bombs2.pdf" www.homeoffice.gov.uk/docs/bombs2.pdf.  This definition and part of this section is adapted from the Mango (Management Accounting XE "Financial security"  for Non-Governmental Organisations) Training Manual, available from  HYPERLINK "http://www.mango.org.uk" www.mango.org.uk.  Adapted from UN Security Coordinator for Kenya security advice  Adapted from the UN booklet Security in the Field, UNSECOORD, 1998  Adapted from UN Hostage Incident Card (undated)  K. Van Brabant (2000) Operational Security Management in Violent Environments published by ODI Humanitarian Practice Network as Good Practice Review No. 8. Available as free download from  HYPERLINK "http://www.odihpn.org" www.odihpn.org.  CARE and UNSECOORD, Landmine and UXO Safety Handbook, 2000. Contact  HYPERLINK "mailto:MineAction@un.org" MineAction@un.org, website  HYPERLINK "http://www.un.org/Depts/dpko/mine/" www.un.org/Depts/dpko/mine/.  K. Van Brabant (2000) Operational Security Management in Violent Environments published by ODI Humanitarian Practice Network as Good Practice Review No. 8. Available as free download from  HYPERLINK "http://www.odihpn.org" www.odihpn.org.  At  HYPERLINK "http://www.peopleinaid.org/download/Security1.doc" http://www.peopleinaid.org/download/Security1.doc or via the  HYPERLINK "http://www.peopleinaid.org" www.peopleinaid.org home page.  Author: D. Lloyd Roberts, published 1999. Available from ICRC Publications Division via  HYPERLINK "mailto:icrc.gva@icrc.org" icrc.gva@icrc.org.  Published 2001. Available at  HYPERLINK "http://www.the-ecentre.net/resources/e_library/index.cfm" www.the-ecentre.net/resources/e_library/index.cfm or by using a search engine.  Published 2001 (3rd edition). Available from  HYPERLINK "http://www.icrc.org" www.icrc.org.  Available at  HYPERLINK "http://www.odihpn.org.uk" www.odihpn.org.uk.  Adapted from RedR risk assessment training handout.  Security directive on inclusion of international staff of intergovernmental and nongovernmental organisations in United Nations security arrangements, UNSECOORD, 1996  This Annex was adapted from the WFP Emergency Field Operations Pocketbook, 2002, page 312.  The task force included UNDP, UNHCR, UNICEF, UNSECOORD, WFP, OCHA, and IOM, as well as ICVA (International Council of Voluntary Agencies), InterAction (American Council for Voluntary International Action), SCHR (Steering Committee for Humanitarian Response) and, as invitees, the Red Cross Movement. Its summary report is entitled UN/non-UN field security collaboration, Report of the consultant to the Inter-Agency Standing Committee Working Group Staff Security Task Force, available on the internet at  HYPERLINK "http://www.humanitarianinfo.org/iasc/prodsec01.doc" http://www.humanitarianinfo.org/iasc/prodsec01.doc or by using a search engine.  Humanitarian community here refers to the totality of humanitarian actors in a given place addressing the same humanitarian concerns. Generic Security Guide PAGE ii Commissioned by ECHO PAGE 104 Commissioned by ECHO Too close to reverse around the corner? Is the intention of checkpoint to kill? Can you drive through? Does the checkpoint have violent intent? Can you drive across country? Consider reversing back around the corner even if under fire Drive through Stop vehicle and run on foot Drive away across country Reverse back around the corner Stop at checkpoint Stop and negotiate yes no yes yes no yes no yes no no ;<]_ Q R S o p ɽymf]fmSFS>Shzi0J#^JjhziU^JjhziU^JhziCJ^J hzi^JjhziU^Jhzi5CJ\^JhziB*CJOJQJ^Jph hzi^Jhzi5CJ$^Jhzi5CJ$\^Jhzi5B*CJ$\^JphhziB*CJP^Jphhzi5B*CJP^JphhziCJ<^JhziOJQJ^JmH sH #jhziOJQJU^JmH sH  <=>?@AVW\]^_  q %6'%v:%a%a%%%%%%%%%%%%%$a$$a$ 9r p v w     ˼𗑍|qlblWblbjHhziUjhziU hzihzi5OJQJaJ!jhzi>*B*Uphhzi hzi0J#jhzi0J#Uhzi5CJ^Jhzi5CJ^Jhzi5CJ^Jhzi5>*B*CJ^JphhziB*CJOJQJ^Jphhzi0J#^JjhziU^JjhziU^J hzi^J"         + , 1 2 "x6e$a$H$$a$ !"#$?@ABEFWXYrstuvwxyz伲伲z!jhzi>*B*Uphj4hziU!jhzi>*B*Uphj>hziUjhziU hzihziCJOJQJ^JaJ!jhzi>*B*Uphhzi hzi0J#hzi5OJQJaJjhzi0J#U0012345678STUVYZ}~ȳȗjhziU!jhzi>*B*Uphj hziU!jhzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#Uj*hziU hzijhziU0!"DEF_`abcdefg !";<=>?˶޲ޡ˖޲ޅzjhziU!j}hzi>*B*UphjhziU!jhzi>*B*Uphhzij hziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!jhzi>*B*Uph0?@ABC^_`adez{|ǽDzǽǽǃǽr!j_hzi>*B*UphjhziUhzi5OJQJaJhzi0J#^J!jihzi>*B*UphjhziUjhziU hzi!jshzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U,AMj Mfb:Vv, ,-.GHIJKLMNOjklmpq $%jhziU!jKhzi>*B*UphjhziU!jUhzi>*B*Uphhzijhzi0J#UjhziUjhziU hzihziCJOJQJ^JaJ hzi0J#4%&'*+IJKdefghijkl˶޲ޡ˖޲ޅ}r}hzi5OJQJaJhzi0J#^J!j-hzi>*B*UphjhziU!j7hzi>*B*UphhzijhziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!jAhzi>*B*Uph, !"=>?@CDhijʵʧۧʋʧۧjhziU!jhzi>*B*UphjhziUhziCJOJQJ^JaJ!j#hzi>*B*Uphhzi hzi0J#hzi5OJQJaJjhzi0J#U hzijhziUjhziU.,-.GHIJKLMNOjklmpq˶޲ޡ˖޲ޅzjvhziU!jhzi>*B*UphjhziU!jhzi>*B*UphhzijhziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!jhzi>*B*Uph06789<=EFG`abcdefghǽDzǽǽǖǽǽ!jhzi>*B*UphjbhziU!jhzi>*B*UphjlhziUjhziU hzi!jhzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U2 !"%&@AB[\]_`abcdDzǖz!jhzi>*B*UphjDhziU!jhzi>*B*UphjNhziU!jhzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U hzijhziUjXhziU0345789:;<WXYZ^_rstj&hziU!jhzi>*B*Uphj0hziU!jhzi>*B*Uphhzijhzi0J#Uj:hziUjhziU hzihziCJOJQJ^JaJ hzi0J#4 456OPQSTUVWXstuvz{˶޲ޡ˖޲ޅ}r}hzi5OJQJaJhzi0J#^J!jhzi>*B*UphjhziU!jhzi>*B*UphhzijhziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!jhzi>*B*Uph,234589TUVopqstuvwxʵʧۧʋʧۧjhziU!jyhzi>*B*UphjhziUhziCJOJQJ^JaJ!jhzi>*B*Uphhzi hzi0J#hzi5OJQJaJjhzi0J#U hzijhziUjhziU.   %&')*+,-.IJKLOPstu˶޲ޡ˖޲ޅzjhziU!j[hzi>*B*UphjhziU!jehzi>*B*UphhzijhziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!johzi>*B*Uph0,Tq4# Y $!r!!"x""#e## $a$$$   !234MNOQRSTUVqrstwxǽDzǽǽǖǽǽ!j=hzi>*B*UphjhziU!jGhzi>*B*UphjhziUjhziU hzi!jQhzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U2234589OPQjklnopqrsDzǖz!jhzi>*B*UphjhziU!j)hzi>*B*UphjhziU!j3hzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U hzijhziUjhziU0-./123456QRSTWXabc|}~jhziU!j hzi>*B*UphjhziU!jhzi>*B*Uphhzijhzi0J#UjhziUjhziU hzihziCJOJQJ^JaJ hzi0J#4 !"#$%@ABCFG     ˶޲ޡ˖޲ޅzjhhziU!jhzi>*B*UphjrhziU!jhzi>*B*Uphhzij|hziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!jhzi>*B*Uph0 ' ( ) * - . 7 8 9 R S T V W X Y Z [ v w x y | } !!!!ǽDzǽǽǖǽǽ!jhzi>*B*UphjThziU!jhzi>*B*Uphj^hziUjhziU hzi!jhzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U2!!!!!"!#!$!%!&!A!B!C!D!G!H!P!Q!R!k!l!m!o!p!q!r!s!t!!!!!!!!!!!!!!!!!!!!!!!Dzǖz!jhzi>*B*Uphj6hziU!jhzi>*B*Uphj@hziU!jhzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U hzijhziUjJhziU0!!!!!!"""""""""6"7"8"9"<"="V"W"X"q"r"s"u"v"w"x"y"z"""""""""""""""""""""jhziU!jhzi>*B*Uphj"hziU!jhzi>*B*Uphhzijhzi0J#Uj,hziUjhziU hzihziCJOJQJ^JaJ hzi0J#4"""""""" #########1#2#3#4#7#8#C#D#E#^#_#`#b#c#d#e#f#g###############˶޲ޡ˖޲ޅzj hziU!j hzi>*B*Uphj hziU!j hzi>*B*Uphhzij hziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!jhzi>*B*Uph0##############$$$$$$ $ $ $&$'$($)$,$-$?$@$A$Z$[$\$^$_$`$a$b$c$~$$$$$$$$$$ǽDzǽǽǖǽǽ!ja hzi>*B*Uphj hziU!jk hzi>*B*Uphj hziUjhziU hzi!ju hzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U2$$$$$$$$$$$$$$$$$$$$$$$$$$$%%%%%%*%+%,%E%F%G%I%J%K%L%M%N%i%j%k%l%Dzǖz!jChzi>*B*UphjhziU!jMhzi>*B*UphjhziU!jWhzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U hzijhziUj hziU0$L%%&Z&&'S''(R(()))6**+h++B,,,b--D.../  l%p%q%%%%%%%%%%%%%%%%%%%%%%%%%%%%&&&&&& &#&$&8&9&:&S&T&U&W&X&Y&Z&[&\&w&x&jhziU!j/hzi>*B*UphjhziU!j9hzi>*B*Uphhzijhzi0J#UjhziUjhziU hzihziCJOJQJ^JaJ hzi0J#4x&y&z&}&~&&&&&&&&&&&&&&&&&&&&&&&&&&'''''' '!'"'%'&'1'2'3'L'M'N'P'Q'˶޲ޡ˖޲ޅzjhziU!jhzi>*B*UphjhziU!jhzi>*B*UphhzijhziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!j%hzi>*B*Uph0Q'R'S'T'U'p'q'r's'v'w''''''''''''''''''''''''((((((("(#($(%()(*(0(1(2(K(ǽDzǽǽǖǽǽ!jhzi>*B*UphjxhziU!jhzi>*B*UphjhziUjhziU hzi!jhzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U2K(L(M(O(P(Q(R(S(T(o(p(q(r(v(w(((((((((((((((((((((()))))))))8)9):);)Dzǖz!jhzi>*B*UphjZhziU!jhzi>*B*UphjdhziU!jhzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U hzijhziUjnhziU0;)?)@)_)`)a)z){)|)~))))))))))))))))))))))))))))*****/*0*1*3*4*5*ȏyj<hziUhzi5OJQJaJhzi0J#^J!jhzi>*B*UphjFhziU!jhzi>*B*Uphhzijhzi0J#UjPhziUjhziU hzihziCJOJQJ^JaJ hzi0J#/5*6*7*8*S*T*U*V*Y*Z*************************++++++ +!+"+#+&+'+F+G+H+伲伲z伲!jhzi>*B*Uphj(hziU!jhzi>*B*Uphj2hziUjhziU hzihziCJOJQJ^JaJ!jhzi>*B*Uphhzi hzi0J#jhzi0J#Uhzi5OJQJaJ0H+a+b+c+e+f+g+h+i+j+++++++++++++++++++++++++ ,!,",;,<,=,?,@,A,B,C,D,_,`,a,Dzǖz!j"hzi>*B*Uphj "hziU!j!hzi>*B*Uphj!hziU!j hzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#UjhziUj hziU hzi0a,b,e,f,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,------@-A-B-[-\-]-_-`-a-b-c-d---ܧ܋j$hziU!jq$hzi>*B*Uphj#hziU!j{#hzi>*B*Uphhzij#hziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U5-----------------------".#.$.=.>.?.A.B.C.D.E.F.a.b.c.d.g.h.....˶޲ޡ䙎˃޲r!jS'hzi>*B*Uphj&hziUhzi5OJQJaJhzi0J#^J!j]&hzi>*B*Uphhzij%hziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!jg%hzi>*B*Uph,............... / //'/(/)/+/,/-/.///0/K/L/M/N/Q/R/]/^/_/x/y/z/|/}/~////////Dzǖz!j5*hzi>*B*Uphj)hziU!j?)hzi>*B*Uphj(hziU!jI(hzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U hzijhziUj'hziU0.///500111D222d334{44:556|66u77>88 999": ///////////////00000 0000.0/000203040506070R0S0T0U0X0Y000000000000000j,hziU!j!,hzi>*B*Uphj+hziU!j++hzi>*B*Uphhzijhzi0J#Uj*hziUjhziU hzihziCJOJQJ^JaJ hzi0J#40000000011111111 1$1%1&1'1*1+1m1n1o111111111111111111111111˶޲ޡ˖޲ޅzj~/hziU!j/hzi>*B*Uphj.hziU!j .hzi>*B*Uphhzij-hziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!j-hzi>*B*Uph011111 2 2 2 222"2#2$2=2>2?2A2B2C2D2E2F2a2b2c2d2g2h2~2222222222222222ĹĴᴪr!j1hzi>*B*Uphjj1hziU!j0hzi>*B*Uphjt0hziUjhziU hzihzi5OJQJaJhzi0J#^J!j/hzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U,22222222222222233333 3B3C3D3]3^3_3a3b3c3d3e3f333333333333333333333jL4hziU!j3hzi>*B*UphjV3hziU!j2hzi>*B*Uphhzijhzi0J#Uj`2hziUjhziU hzihziCJOJQJ^JaJ hzi0J#43333333344444444 4;4<4=4>4A4B4Y4Z4[4t4u4v4x4y4z4{4|4}444444444444444˶޲ޡ˖޲ޅzj.7hziU!j6hzi>*B*Uphj86hziU!j5hzi>*B*UphhzijB5hziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!j4hzi>*B*Uph04444455555 5555354555758595:5;5<5W5X5Y5Z5]5^5555555555555555555555 6ǽDzǽǽǖǽǽ!j9hzi>*B*Uphj9hziU!j8hzi>*B*Uphj$8hziUjhziU hzi!j7hzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U2 666666666162636466676Z6[6\6u6v6w6y6z6{6|6}6~666666666666666666677Dz۪۟ǃxj;hziU!j;hzi>*B*Uphj;hziUhzi5OJQJaJhzi0J#^J!j:hzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U hzijhziUj:hziU.77777S7T7U7n7o7p7r7s7t7u7v7w7777777777777777777777777888788898;8<8˶޲ޡ˖޲ޅzj>hziU!jc>hzi>*B*Uphj=hziU!jm=hzi>*B*Uphhzij<hziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!jw<hzi>*B*Uph0<8=8>8?8@8[8\8]8^8a8b8888888888888888888888999999 9 9 9&9'9(9)9,9-9b9c9d9}9ǽDzǽǽǖǽǽ!jEAhzi>*B*Uphj@hziU!jO@hzi>*B*Uphj?hziUjhziU hzi!jY?hzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U2}9~99999999999999999999999999999999::::::: :!:":#:$:?:@:A:B:Dzǖz!j'Dhzi>*B*UphjChziU!j1Chzi>*B*UphjBhziU!j;Bhzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U hzijhziUjAhziU0B:F:G:Z:[:\:u:v:w:y:z:{:|:}:~:::::::::::::::::::;;;; ; ;;;;7;8;9;;;<;=;>;?;@;[;\;jFhziU!jFhzi>*B*UphjEhziU!jEhzi>*B*Uphhzijhzi0J#UjDhziUjhziU hzihziCJOJQJ^JaJ hzi0J#4":|::>;;;P<<<Q==>>?_??@u@@AjAABoBpBqBB$a$   \;];^;b;c;v;w;x;;;;;;;;;;;;;;;;;;;;;;;;;;;;<<<<<<.</<0<I<˶޲ޡ䙎˃޲r!jHhzi>*B*UphjzHhziUhzi5OJQJaJhzi0J#^J!jGhzi>*B*UphhzijGhziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!j Ghzi>*B*Uph,I<J<K<M<N<O<P<Q<R<m<n<o<p<s<t<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< = ===Dzǖz!jKhzi>*B*Uphj\KhziU!jJhzi>*B*UphjfJhziU!jIhzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U hzijhziUjpIhziU0===/=0=1=J=K=L=N=O=P=Q=R=S=n=o=p=q=t=u======================>>>>>>>>>7>8>j>NhziU!jMhzi>*B*UphjHMhziU!jLhzi>*B*Uphhzijhzi0J#UjRLhziUjhziU hzihziCJOJQJ^JaJ hzi0J#48>9>:>=>>>g>h>i>>>>>>>>>>>>>>>>>>> ? ????????0?1?2?3?6?7?=?>???X?˶޲ޡ˖޲ޅ}r}hzi5OJQJaJhzi0J#^J!jPhzi>*B*Uphj*PhziU!jOhzi>*B*Uphhzij4OhziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!jNhzi>*B*Uph,X?Y?Z?\?]?^?_?`?a?|?}?~?????????????????????????@@@@@@@@ @;@<@ʵۭЭʑۭЭj ShziU!jRhzi>*B*UphjRhziUhzi0J#^J!jQhzi>*B*Uphhzi hzi0J#hzi5OJQJaJjhzi0J#U hzijhziUj QhziU.<@=@>@B@C@S@T@U@n@o@p@r@s@t@u@v@w@@@@@@@@@@@@@@@@@@@@@@@@@@@@AAAAA˶޲ޡ˖޲ޅzjUhziU!jsUhzi>*B*UphjThziU!j}Thzi>*B*UphhzijThziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!jShzi>*B*Uph0AAAAA7A8A9A:A>A?AHAIAJAcAdAeAgAhAiAjAkAlAAAAAAAAAAAAAAAAAAAAAAAAAAAABǽDzǽǽǖǽǽ!jUXhzi>*B*UphjWhziU!j_Whzi>*B*UphjVhziUjhziU hzi!jiVhzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U2BBBBBBBBB9B:B;B*B*Uphhzi5CJ^JmHnHuhzimHnHujYhziU!jKYhzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U hzijhziUjXhziU'BBCVCCDoDD+EEEBFFFYGG HkHH.IIIDJJKuKK/LL  BBCCCCCCC"C#C$C%C(C)C4C5C6COCPCQCSCTCUCVCWCXCsCtCuCvCyCzCCCCCCCCCCCCCCCʵۭЭʑۭЭj\hziU!j-\hzi>*B*Uphj[hziUhzi0J#^J!j7[hzi>*B*Uphhzi hzi0J#hzi5OJQJaJjhzi0J#U hzijhziUjZhziU.CCCCCCCCDDDDDDDDD4D5D6D7D:D;DMDNDODhDiDjDlDmDnDoDpDqDDDDDDDDDDDDD̷䱭̑䱭uj_hziU!j_hzi>*B*Uphj^hziU!j^hzi>*B*Uphhzi hzi0J#j]hziUjhziU hzihzi5OJQJaJhzi0J#^Jjhzi0J#U!j#]hzi>*B*Uph.DDDDDDDDDDDDD E E E$E%E&E(E)E*E+E,E-EHEIEJEKENEOEnEoEpEEEEEEEEEEEEEEEEEE۸՜۸Հ۸!jahzi>*B*UphjvahziU!j`hzi>*B*Uphj`hziUhzi0J#^J!j`hzi>*B*Uphhzi hzi0J#hzi5OJQJaJjhzi0J#UjhziU hzi2EEEEEEEEEEEFFFFFF F!F"F;F*B*UphjbchziUhzi0J#^J!jbhzi>*B*Uphhzi hzi0J#hzi5OJQJaJjhzi0J#UjlbhziU hzijhziU0FFFFFFFFFFFFFFFFF G G G GGG7G8G9GRGSGTGVGWGXGYGZG[GvGwGxGyG}G~GGGGGGG̷䱭̑䱭uj:ghziU!jfhzi>*B*UphjDfhziU!jehzi>*B*Uphhzi hzi0J#jNehziUjhziU hzihzi5OJQJaJhzi0J#^Jjhzi0J#U!jdhzi>*B*Uph.GGGGGGGGGGGGGGGGHHH H H H HHH*H+H,H-H1H2HIHJHKHdHeHfHhHiHjHkHlHmHHHHHHHHH۸՜۸Հ۸!jihzi>*B*Uphj&ihziU!jhhzi>*B*Uphj0hhziUhzi0J#^J!jghzi>*B*Uphhzi hzi0J#hzi5OJQJaJjhzi0J#UjhziU hzi2HHHHHHHHHHHHHHHHH I II'I(I)I+I,I-I.I/I0IKILIMINIRISIeIfIgIIIIIIIIIIII˶ܮѮ˒ܮѮjlhziU!jkhzi>*B*UphjkhziUhzi0J#^J!jjhzi>*B*Uphhzi hzi0J#hzi5OJQJaJjhzi0J#UjjhziU hzijhziU0IIIIIIIIIIIIIIIIIJJ J JJJ"J#J$J=J>J?JAJBJCJDJEJFJaJbJcJdJhJiJJJJJJJ̷䱭̑䱭ujnhziU!jonhzi>*B*UphjmhziU!jymhzi>*B*Uphhzi hzi0J#jlhziUjhziU hzihzi5OJQJaJhzi0J#^Jjhzi0J#U!jlhzi>*B*Uph.JJJJJJJJJJJJJJJJKKKKKKKK K;KKBKCKSKTKUKnKoKpKrKsKtKuKvKwKKKKKKKKK۸՜۸Հ۸!jQqhzi>*B*UphjphziU!j[phzi>*B*UphjohziUhzi0J#^J!jeohzi>*B*Uphhzi hzi0J#hzi5OJQJaJjhzi0J#UjhziU hzi2KKKKKKKKKKKKKKKKK LLL(L)L*L,L-L.L/L0L1LLLMLNLOLSLTLeLfLgLLLLLLLLLLLL˶ܮѮ˒ܮѮjshziU!j=shzi>*B*UphjrhziUhzi0J#^J!jGrhzi>*B*Uphhzi hzi0J#hzi5OJQJaJjhzi0J#UjqhziU hzijhziU0LLLLLLLLLLLLLLLLLMMMMMM&M'M(MAMBMCMEMFMGMHMIMJMeMfMgMhMkMlMvMwMxMM̷䱭䱎̃䱭r䱎!jvhzi>*B*UphjuhziUhziCJOJQJ^JaJ!j)uhzi>*B*Uphhzi hzi0J#jthziUjhziU hzihzi5OJQJaJhzi0J#^Jjhzi0J#U!j3thzi>*B*Uph,LLHMMM3NNN#OOO>PPP&QqQQ R`RRSPSST{TTUmUU  MMMMMMMMMMMMMMMMMMMMMMMMMMMNNNN N NNNN,N-N.N0N1N2N3N4N5NPNQNRNSNDzǖz!jyhzi>*B*UphjxhziU!j xhzi>*B*UphjwhziU!jwhzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U hzijhziUjvhziU0SNVNWNjNkNlNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNOOOOOO O!O"O#O$O%O@OAOjh{hziU!jzhzi>*B*UphjrzhziU!jyhzi>*B*Uphhzijhzi0J#Uj|yhziUjhziU hzihziCJOJQJ^JaJ hzi0J#4AOBOCOFOGO_O`OaOzO{O|O~OOOOOOOOOOOOOOOOOOOOOOOOPPPPPPPPP7P8P9P;P*B*UphjT}hziU!j|hzi>*B*Uphhzij^|hziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!j{hzi>*B*Uph0P?P@P[P\P]P^PaPbPlPmPnPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPQQQQQǽDzǽǽǖǽǽ!jhzi>*B*Uphj6hziU!jhzi>*B*Uphj@hziUjhziU hzi!j~hzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U2Q Q!Q#Q$Q%Q&Q'Q(QCQDQEQFQIQJQOQPQQQjQkQlQnQoQpQqQrQsQQQQQQQQQQQQQQQQQQQQQQQDzǖz!jhzi>*B*UphjhziU!jhzi>*B*Uphj"hziU!jhzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U hzijhziUj,hziU0QQQQQQRRRRRR R R R&R'R(R)R,R-R>R?R@RYRZR[R]R^R_R`RaRbR}R~RRRRRRRRRRRRRRRRRRRjhziU!jhzi>*B*UphjhziU!jhzi>*B*Uphhzijhzi0J#UjhziUjhziU hzihziCJOJQJ^JaJ hzi0J#4RRRRRRRRRRRSSSSSS S!S"S#S&S'S.S/S0SISJSKSMSNSOSPSQSRSmSnSoSpSsStSSSSSSSSS˶޲ޡ˖޲ޅzj܈hziU!jahzi>*B*UphjhziU!jkhzi>*B*UphhzijhziUjhziU hzihziCJOJQJ^JaJ hzi0J#jhzi0J#U!juhzi>*B*Uph0SSSSSSSSSSSSSSTTTTTTTTT:T;T*B*UphjȊhziU!jMhzi>*B*Uphj҉hziUjhziU hzi!jWhzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U2TTTTTTTTTTTTTTTTTTUUUUUUU U!UU?UBUCUKULUMUfUgUhUjUkUlUmUnUoUUUUUDzǖz!j%hzi>*B*UphjhziU!j/hzi>*B*UphjhziU!j9hzi>*B*Uphhzi hzi0J#hziCJOJQJ^JaJjhzi0J#U hzijhziUjhziU0UUUUUUUUUUUUUUUUUUUUUUUU V V V VVVVVV-V.V/V0V4V5VhViVjVVVVVVVȏyjhziUhzi5OJQJaJhzi0J#^J!jhzi>*B*UphjhziU!jhzi>*B*Uphhzijhzi0J#UjhziUjhziU hzihziCJOJQJ^JaJ hzi0J#/UVVV5WWW0X~XXlYY*ZZZW[[[[[\\\\\]] & Fg & Fg 9r   VVVVVVVVVVVVVVVVVVVVVVVVWWWWWWW.W/W0W2W3W4W5W6W7WRWSWTWUWYWZWiWjWkWW¸­¸¸‘¸¸!jhzi>*B*UphjxhziU!jhzi>*B*UphjhziUjhziU hzihzi0J#^J!jhzi>*B*Uphhzi hzi0J#jhzi0J#Uhzi5OJQJaJ1WWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWX XXX(X)X*X-X.X/X0X1X2XMXNXʵۭЭʑۭЭjZhziU!jߔhzi>*B*UphjdhziUhzi0J#^J!jhzi>*B*Uphhzi hzi0J#hzi5OJQJaJjhzi0J#U hzijhziUjnhziU.NXOXPXTXUX[X\X]XvXwXxX{X|X}X~XXXXXXXXXXXXXXXXXXXXXYYYYYYIYJYKYdYeYfY̷䱭̑䱭uj<hziU!jhzi>*B*UphjFhziU!j˖hzi>*B*Uphhzi hzi0J#jPhziUjhziU hzihzi5OJQJaJhzi0J#^Jjhzi0J#U!jՕhzi>*B*Uph.fYiYjYkYlYmYnYYYYYYYYYYYYYYYYYYYYYYYYYZZ Z"Z#Z$Z'Z(Z)Z*Z+Z,ZGZHZIZJZNZOZeZfZ۸՜۸Հ۸!jhzi>*B*Uphj(hziU!jhzi>*B*Uphj2hziUhzi0J#^J!jhzi>*B*Uphhzi hzi0J#hzi5OJQJaJjhzi0J#UjhziU hzi2fZgZZZZZZZZZZZZZZZZZZZZZZZZZZZ[[[[["[#[4[5[6[O[P[Q[T[U[V[W[X[Y[t[u[˶ܮѮ˒ܮѮj hziU!jhzi>*B*UphjhziUhzi0J#^J!jhzi>*B*Uphhzi hzi0J#hzi5OJQJaJjhzi0J#UjhziU hzijhziU0u[v[w[[[[[[[[[[[[[[[\(`)`rasaTbUbbbcc!c=c>c?cXfYf^fmfnf䷭yyymf]fmmf]fhziCJ^J hzi^JjhziU^Jhzi^JaJhziPJ^JaJ hzi\^J hzi5^JhziOJQJ^JmH sH  hzi^JjhziU^Jhzi5OJQJaJjhziUjhziU hzihzi0J#^Jjhzi0J#U!jhzi>*B*Uph$]>^?^__(`)````#asaaaUbbbAcBcccd>dTdmddPeQe & Fg & Fh^h & FzQe#f$fff&hEhiijjSkTkkk/mSmsmynznSoTocopp"r#r1rs & Fgnfofjjjjjjmlnlsl|l}l~l.m/memfmkmpmqmrmUnVn[nbncndnppppppxxxxxxxxxxx yyy%y&y'yyy z z z||||||||||~~&'wx}hzi0J$^JhziOJQJ^JmH sH hzi56^J hzi5^JhziCJ^J hzi^J hzi^JjhziU^JHss+u,uwwwxxxy z z{{|| ~ ~~~:][ & Fg 9r  & F}ƀǀȀGHĂłǂ̂5~އ߇ FGLXYZ$457<UVW˖̖͖016GHIhi hzi5^JhziOJQJ^Jhzi0J$^J hzi^JjhziU^J hzi^JhziCJ^JM[ 45ކ߆\[\34 & F! & F! & Fg42Fkl@AÓZu>?vԛ՛ & Fg & Fg & F!inz{|yz:;@GHI'(-MNOPQV^_`vw|ä5:;@EFG荒hzi5^Jjhzi5U^J hzi5^Jjhzi0J$U^JhziOJQJ^J hzi^JjhziU^JhziCJ^J hzi^JC !֢ע*I5{|Ƨǧh$a$ & F! & Fg%d&d7$8$H$OP7$8$H$GƧScklq;KLQabdi3AIJO]^_%$>?@߷)*,1J¹޹¹޹hziOJQJ^JmH sH hzi5^Jjhzi5U^J hzi5^JhziCJ^JhziCJ^J hzi^JjhziU^J hzi^JChi_`5ARS:;23ή & Fg & Fg & F!78PӲ.fPQcɷ & Fg & F!\jklm}~gh & Fg & F! 9r JKL*\i NOTefg*+,$%',89:/01EFKghjo">?@jhzi0J$U^JhziCJ^J hzi5^J hzi^JjhziU^J hzi^JP+,^_ghyz79? & F! & Fg"@ABpqv_`e*EFKTUV '(),ĹĹhziCJOJQJ^JhziOJQJ^JjhziOJQJU^JhziOJQJ^J hzi^JhziCJ^J hzi^JjhziU^JD?+7*3WX+,}9\{%d&d7$8$H$OP & Fg & F! & F!tuz rsxtuz./4HIJqrwhziCJ^J hzi^J hzi^JjhziU^JXCfCVW12 & Fg7$8$H$ & F!PQgh6QQRZn & FH & F! & FgEFKWXYmns}~",-.89>CDE &'(VW\xyz                YZ hzi^JjhziU^J hzi^JhziCJ^JW+R46C bct  & F! & FHt     A V z     & ' `a)  _() & F! & FgZ_rst#679>\]^349UVW!"'789_`eqrs   & ' ( !!!!!!""""""''**#*F*G*H*++ hzi5^J hzi^JjhziU^JhziCJ^J hzi^JT !*qrgh&'RSpqSTt:; & Fg & F!;X!Y!c"y"b#c#$$%%'')*++v-w-./ 1 111 & Fg & Fg+,(,),*,,,,,,,3/4/9/J/K/L/999999[;\;a;h;i;j;f=g=l================>>>&>'>(>#I$I)IJIKILIJJJJJJKKKLLLLLLLLLLMMMOOOOOOR hzi^JjhziU^JhziCJ^J hzi^JW1*2h2233454s4444(6)677Z8888^999q:r::F;;N< & Fg & F!N<r<<==*=F>G>>>P?t??9@:@@@BB&D'DEEjHkHHIIJ & F!JKQKLLLNNOOOPPQQRLTMTVVTXUX[[]]h^i^^ & F!RR$RCRDRFRKRjRkRmRrRRRRRRRRLcMcRcbcccdcBfCf|f}fffffffffKkLkQk[k\k]knnnnnn8p9p>pMpNpPpUp`papbpuuuuuuuvvvwxxx}xxxxxxxyyy{{{ |jhzi0J$U^J hzi^JhziCJ^J hzi^JjhziU^JS^^^^=_>___CaDaaaab bGbjbybbbcccHdbdddjef & F!ffEfFfafgghhNjOjkkkmmEnFnMnRoSooooq qrrssszu{uuwwwww!xLx`xxxyy"zz{{{{{||}} & F! & FI & F!$a$ | |||\|]|b|s|t|u||||}}}}D~E~J~\~]~^~~~~~~~ijo}~Ɂʁρ~  345ߒ hzi;^JhziCJ^JhziCJOJQJ^JhziOJQJ^JjhziOJQJU^JhziOJQJ^J hzi^JjhziU^J hzi^J@}'~_~v~~~Vzst;<ÄĄfpԉՉ#$ & Fg & F!؎َ͑STF~ O1vL֗ & Fr & Fq & Fq & Fp & FgF !1LMRWXYvӖԖٖߖ().9:;349DEFGHMWXYZǝȝ͝зhziCJOJQJ^JhziOJQJ^JjhziOJQJU^JhziCJ^JhziOJQJ^J hzi^Jjhzi0J$U^JjhziU^J hzi^J>֗Sox^_؜ٜ3Zן؟ST & Ft & Fs & Fs & Fk & Fg & Frƣǣ̣ߣޤߤw7KLQWXYϨШըܨݨިߨ/05FGHmxy~ūƫ˫ѫҫӫ$%&9ĸĸhziB*^JphjhziB*U^JphhziB*^Jph hzi^JhziCJ^J hzi^JjhziU^JHɡi[M!UxߨndSfܮ & Fv & Fu & FJ & Ft9:?OPQRSTY_`aίϯЯޯ߯#CDE67:  '\?@E_`aŶƶ˶ҶӶȸҖhziB*^JphhziCJOJQJ^JhziOJQJ^JjhziOJQJU^JhziOJQJ^J hzi^Jjhzi0J$U^JhziCJ^J hzi^JjhziU^J;ܮ;b9:'{ & F & F & Fw & FvӶԶ\]bijkԽսڽ '()%&+<=>FGLUVWVW\ijkCDI_`a|}TUZhziCJ^J hzi^J hzi^JjhziU^JX{|ֻ׻)*>ObCDbct & F & Fl & FgXl  U1O|}{|\] & F],-9N{2Dq7=>st<= & F=DVW78D  !:;EFT & F & Fm & FgZabc{|016QRSXY^jkl56;NOPmns*+,WX]yz hzi;^J hzi5^J hzi^JjhziU^J hzi^JhziCJ^JRT~@Amn+-`al7$8$H$ & F+-qrw !&,-/49:;+,1ABCtuz&'(̼̼̼hziB*^JphjhziB*U^JphhziB*^Jph hzi5^J hzi^JjhziU^J hzi^JhziCJ^JE  ,-.PQVfgh|}GH                  'i! jhzi0J$U^Jhzi^JmH sH  hzi5^JhziCJ^J hzi^JjhziU^J hzi^JL<elGH~op)*)* & F & Fg@A     ! g   45&'hi & F7$8$H$7$8$H$^ & Fg!"~67Jh ij3KM & F & Fg^ & F7$8$H$016DEFs#t#y############''''''''''))!)>)?)@),,,9,jhzi0J$U^J hzi^JjhziU^JhziCJ^J hzi^JRMN!5aw   !_!`!!!#3#$$%%N'O'( )* & F & Fg & Fg**=+>+,,--////x0y0061S1c111=2g22334?4U5V5 & F & Fg9,:,;,--- . . .//00000102030000000222222\4]4b4444555555a7b7g7777[8\8a8l8m8o8t88888888Q9[999H:S:p:x:+>i>WCXC]CwCxCyCmDnDsDDDD hzi>*^JhziCJ^J hzi^JjhziU^J hzi^JTV5\5l5{55556'778C8::a<b<>>>>&@`@@@tAAAWB & Fg & Fg & FWBXBB CCCDDfEgE F FFFGHHIJ JJJJLKuKKKK0L1L & Fg & FDH H%HDHEHFH1J2J7JYJZJ[JKKK&K'K(KLLLLLLOO OOOO7Q8Q=QXQYQZQSS S=S>S?STWUWZW}W~WWgXhXmXXXXXXXXYYYYYY]]]#^$^%^>`?`D`V`W`X`jakapaaaaeeeeeehziCJ^J hzi^JjhziU^J hzi^JX1LFLQLdLuLL>MMMNXNNNNN8OOP?PbPcPPPQQRRRR & FRTTUUWCW?Y^Y5Z6ZZ [{[[\&\I\a\r\v\\\\\]]^^ & F & Fg^y_``` abbcc`ewehh%i&iiik,kllXnnnrosopp & Fg & Fg & Feeeeeee%h&h+hGhHhJhOhlhmhnh@kAkFkbkckdkmmm:m;m\XYl&' & F & F & Fgsty  !&:;=BVWX \XYlz{ѹ!"'678Xۼܼ     ӴӪӴӴӴhziOJQJ^Jjhzi0J$U^J hzi^JjhziU^J hzi^J hzi5^JhziCJ^Jhzi5^Jjhzi5U^JC'йѹ89WX*+:Xlʾ #< & Fg & Fg & F 7$8$H$^  WX]fgh'()679>QRS./0yz./0  456j{hziU^JjhziU^J hzi;^JhziCJ^J hzi^J hzi^JjhziU^JLno*3PKLhJKEI] & F & Fn & FgGHL01_=g  kl & Fg & Fg & F6JKZ[#()*./vw|E蕎蕎蕎 hzi^JjhziU^JhziCJ^Jhzi0J#^Jjhzi0J#U^JjhziU^Jj)hziU^JjThziU^J hzi^JjhziU^Jhzi0J#^J4EF  !"GHqr÷тxnanjhziU^JjhziU^Jhzi^JmH sH jhziCJU^JhziCJ^JhziCJOJQJ^J"jhziCJOJQJU^JhziCJOJQJ^JhziOJQJ^JmH sH hziCJ^J hzi^JjhziU^J hzi^Jjhzi0J$U^J"l{|!"&GEkd$$Ifl0%_2 4 la$'dIfQ 9r  & Fg GHKqrw`Ekdu$$Ifl0%_2 4 la$'dIfQEkd$$Ifl0%_2 4 la`ZQ $$Ifa$$IfEkd3$$Ifl0%_2 4 la$'dIfQEkdԢ$$Ifl0%_2 4 laHILndEkd$$Ifl0%_2 4 la $$Ifa$$IfEkd$$Ifl0%_2 4 lanosdEkd$$Ifl0%_2 4 la $$Ifa$$IfEkdP$$Ifl0%_2 4 ladEkdm$$Ifl0%_2 4 la $$Ifa$$IfEkd$$Ifl0%_2 4 la '(,KdEkd+$$Ifl0%_2 4 la $$Ifa$$IfEkd̥$$Ifl0%_2 4 laKLPopxdEkd$$Ifl0%_2 4 la $$Ifa$$IfEkd$$Ifl0%_2 4 ladEkd$$Ifl0%_2 4 la $$Ifa$$IfEkdH$$Ifl0%_2 4 la!?dEkde$$Ifl0%_2 4 la $$Ifa$$IfEkd$$Ifl0%_2 4 la?@DcdidEkd#$$Ifl0%_2 4 la $$Ifa$$IfEkdĨ$$Ifl0%_2 4 ladEkd$$Ifl0%_2 4 la $$Ifa$$IfEkd$$Ifl0%_2 4 ladEkd$$Ifl0%_2 4 la $$Ifa$$IfEkd@$$Ifl0%_2 4 la236EdEkd]$$Ifl0%_2 4 la $$Ifa$$IfEkd$$Ifl0%_2 4 laEFLnoydEkd$$Ifl0%_2 4 la $$Ifa$$IfEkd$$Ifl0%_2 4 lae\ $$Ifa$Ekd٬$$Ifl0%_2 4 la$If$IfEkdz$$Ifl0%_2 4 la@A  .?v~m| & Fg & FgEkd8$$Ifl0%_2 4 la&'(89vwxNO jhziU^JjhziU^JjkhziU^JjhziU^JhziCJ^J hzi^JjhziU^J hzi^JjhziU^Jhzi0J#^J72F$%12<=ABVW$a$$a$ & F$%12<=ABUV/'IYZ_defpqv|}~h}ܳܳܳhzi\]^JmH sH hziCJ^J hzi^JjhziU^J hzi^Jhzi5CJ$\^JhziCJH^Jhzi5CJH\^JFWXYp//c)vC&'I & F  & F2hyGC<}gh}ij>v  & F  & F & F}jyz= > C K L M *+,?@E^_`?@EQRS*+-hziB*^Jphhzi\]^JmH sH hzi56\]^JmH sH hziCJ^J hzi^JjhziU^J hzi^JH0UVc?JnORS  & F & FK~& i     2 @A0u/J] & F] JPVS &'kji & F-29:;QRWhij)*/=>?   %%#%<%=%>%++++++s00555354565;5H5I5J5o9p9u9}9~999999<<<<<<<`?ݾhziOJQJ^JmH sH  hzi>*^JhziOJQJ^J hzi^JjhziU^JhziCJ^J hzi^JK"#EF!AgBfg   ! !""""## & F#%%~&&:';'s(t((())B*C***y+z++,,--..$0%0r0 & Fr0s00@1]111233#445@6A6S7T788@9A9]9*:+:e;f;,<-< & FK & F5 & F5-<<<<<=O=t====7>8>>>_?`?u????????@ & F1  & F & F8 & F8 9r `?u?AAA'B2B3BCCEEEFFFGGGGGG4I5I:IXIYIZIIIIJJJtKxK{KKKKKKKKKKKKKKK@LMMLNYNNNNN OO"O4OOO𿸯𿸯𿸯𿸯𿸯𿸯hzi5\^JhziCJ^J hzi^JjhziU^JhziOJQJ^J hzi6^J hzi5^Jhzi56^JmH sH  hzi^Jhzi^JmH sH A@c@u@|@@@@@@@@@AAAAA B&B'B3BDBeBBBBB)C & FK  & F & F1)C`CrCCCCCDTDDaEEEEGGU?UDUIUJUKUWWWWWWXXSee\fftgghh_iqiiiiij9jljVkkkkkkkll)l:l & F4 & FL & F=7$8$H$g_iiiiiiiljjVkkRlllqqqqqqqqqrrrrs s s sstttyttttttttttdvvwwwwwwyyӭӭӭӭhziOJQJ^Jhzi6B*^Jphhzi5B* ^JphhziB*^JphjhziB*U^Jphhzi^JmH sH hziCJ^J hzi^JjhziU^J hzi^JhziB*^Jph5:lRlllllnnn*ohopqqqqrrbsssKttuucv  & F7$8$H$7$8$H$ & F=7$8$H$ & FLcvdvvvyy~{{||~~'$% [' & F=7$8$H$7$8$H$yy~{{||||||||~=~klqwxyÂĂłׂ؂ƃǃ̃꼰©©znnzznhziB*^JphjhziB*U^Jphhzi0J#^JjhziU^JjhziU^J hzi^JjhziU^J hzi^JhziCJ^Jhzi5B*^Jph"jhzi5B*U^JphhziB*^Jphhzi5B*^Jph+)*/456͆Άӆ؆نچ%&+012ÈɈʈˈ=\]bghiP789=͒Βϒ͓̓ғޓߓʾʾʾʾʾ hzi^JjhziU^J hzi^JhziB*^JphjhziB*U^JphhziB*^JphhziCJ^JH'̈=P݋!e=>VW & FM & F=7$8$H$PД'r˖AњҚfO" & F>7$8$H$  & F7$8$H$7$8$H$ & F- & F-!"#ҕӕؕGHMcdek78_byz¥ƥ4:Ц֦@ʺԮʺԮʢwhziCJOJQJ^J hzi5^JhziOJQJ^JmH sH hzi^JmH sH hzi6B*^JphhziB*^JphjhziB*U^JphhziB*^JphhziCJ^J hzi^JjhziU^JhziOJQJ^J hzi^J."klOPƟĠ%7878ףQ_`a & F> 7$8$H$7$8$H$  & F7$8$H$ & F>7$8$H$abyz¥34ϦЦ?@Щѩ%&""7$8$H$  9r 7$8$H$  & F7$8$H$7$8$H$@Ũ\]bhij&/    ().?@A'(),<(Cx   hzi5\^J hzi5^JhziCJ^J hzi^JjhziU^J hzi^JhziB*^JphhziCJOJQJ^JH&0XYƯۯSʰ{abpղ & F$U]hwx  +,<,-ݷ-Y'(Cc & F$cϺ`KLwx5 & F$ 78=EFGwx} *+-2:;<GZ"#(89:  L`123,-hzi0J#^JjyhziU^JjhziU^JhziOJQJ^Jhzi^JmH sH hziCJ^J hzi^JjhziU^J hzi^JC5wLMFGZh=*)i & FN & F$  & F & F$KL`=k *O   & FN & F.^  & F & F$.FDZ~>?Pxy{| & FE !DEFgo?PFGLbcd567{謁謁﵌謁hzi5^Jjhzi5U^JhziCJ^J hzi^JjhziU^J hzi5^Jjhzi0J$U^Jhzi\]^Jhzi56^Jhzi0J#^Jj<hziU^J hzi^JjhziU^J3[\@Aide12abp & FAlmrAi?@Ejkl}~3YZjhzi0J$6U^J hzi6^J hzi>*^JhziOJQJ^JmH sH jhzi0J$U^J hzi5^JhziCJ^J hzi^J hzi^JjhziU^J?0KXs|~ & FB 9r  & FAFX.5x]h`hh^h & F9 & F:.>?hij~VW./lmn34DEJPQR͸͸͸͸͸j?hziU^Jj hziU^JjݷhziU^JjhziU^Jhzi0J#^Jj!hziU^JjhziU^J hzi5^JhziCJ^J hzi^J hzi^JjhziU^J4Rxy]^   " # $   Q R W    h i      ]^_»»»hziOJQJ^JmH sH  hzi5^JjֽhziU^Jjhzi0J$U^JhziCJ^J hzi^JjhziU^JjhziU^Jhzi0J#^JjthziU^JjhziU^J hzi^J4:;    - . ^_ |}P & F9 9r  & F+;<^_`cdi%&+ABCDEiӾݱӾݍӾjhziU^Jhzi0J#^Jjhzi0J#U^JjHhziU^Jhzi0J#^JjhziU^JjhziU^J hzi^JjhziU^JhziCJ^J hzi^J4ijkz{;<=MNvw|myy"#!!!!!!J!K!P!V!W!X!)))9):);)...6.7.8.].^.ڪڪڪڪڜڪhziOJQJ^JmH sH  hzi5^JhziCJ^J hzi^JjhziU^JjhziU^J hzi^Jhzi0J#^JjhziU^JjhziU^J=PQde  "#,-!!3!""##R$S$ 9r S$d%e%&&&&''h(i(i)j)** , ,H-I----O/P///00,1 & F3 & F*^.c.v.w.x.33344455$606777777;<==LLLLLL2M3MRRRRRRSSST T!TUUUUUUUVV VW+WXXXXNZ^ZO\b\ݵݮݵݤݮݮhziOJQJ^J hzi5^Jjhzi0J$U^Jhzi\^JmH sH hzi^JmH sH  hzi6^J hzi^JjhziU^JhziCJ^J hzi^J@,1-11233333[5\555555#6$606I66666U7V778  & F & F(8899:9C:D:;;;;<+<,<<<==,>->>>>>>;@<@BB & Fx  & F & F)BBBlCmC\D]DFF.G/GPIQIKKL LLLLlMmMNNvOwOO7$8$H$ 7$8$H$^ & F) & FxOO{P|PIRJRRR8S9SSSTTUUUWW+WWWXXXYbjb$Ifokd$$Ifl40% 04 laf4jbkbubb{ $ 9r $Ifa$$Ifokd$$Ifl40% 04 laf4bbbb{ $ 9r $Ifa$$Ifokd@$$Ifl40% 04 laf4bbbc$Ifokd$$Ifl40% 04 laf4cccFc$Ifokdp$$Ifl40% 04 laf4FcGcKcc$Ifokd$$Ifl40% 04 laf4ccc&d$Ifokd$$Ifl40% 04 laf4&d'd0dd$Ifokd8$$Ifl40% 04 laf4dddd$Ifokd$$Ifl40% 04 laf4ddde$Ifokdh$$Ifl40% 04 laf4eeece$Ifokd$$Ifl40% 04 laf4cederee$Ifokd$$Ifl40% 04 laf4eeeeeifjfffffg ggg}}}}} & F<7$8$H$7$8$H$okd0$$Ifl40% 04 laf4ghhPiQiiiii j jPjQjjjjkkkkkkkkkkk 9r 7$8$H$ & F<7$8$H$jjjkkkkklllNmOmTm_m`mamVnWn\ngnhninnnnnnnnnnnnnFpGpLpWpXpYpqq"q-q.q/qgqtqrrƹƩ䝩Ʃ䝩Ʃ䝩Ʃ䝩Ʃ䝩Ʃ䝩ƑƑhzi5B*^JphhziB*^JphjhziB*U^Jphhzi5B*\^JphhziB*^JphhziOJQJ^JmH sH  hzi^JhziCJ^J hzi^JjhziU^J2kkklll$l-l7l@lJlSl^lhlrl{lllllmmnnppqqfq7$8$H$fqgqtqrrstttft}tttuu uouuNvOvjv-x.xgyhyzz{ & FG & FF7$8$H$rrrrrrs s ssssstttu uCuDuIu_u`uauMvNvvvvvvvwwwwwwxxx yyy}}}²ئ ؆؆؆؆}hzi6]^J hzi^JjhziU^J hzi5^J hzi^JhziB*^JphjhziB*U^JphhziB*^Jphhzi5B*^JphhziCJ^Jhzi5B*^Jph"jhzi5B*U^Jph.{{}};~P~׀ FN{́L & F}}#~$~%~8~9~p~q~v~~~~BJcdibchrstk}֓/05ABC 4'0FPۚAIǾǾǾﴪǾhziOJQJ^Jhzi^JmH sH hziCJ^J hzi^JjhziU^Jhzi0J#^JjhziU^J hzi^JjhziU^J>'$߇ ABJ߈'eDC  & F & FAb9n7njk}BG & F & F  & FMՓ֓"k5]Ȗp֗ 4z& & F  & F&'0ZљEFPښۚ@AI}~  0eu & F  & Fu:$ ƠǠhiȡBC./ & F & F & F"#(23489lm"#MNS#>?@GHn躭躡躍躡j3hziU^J hzi^JjhziU^JjjhziU^J hzi^JhziCJ^Jhzi0J#^Jjhzi0J#U^Jhzi0J#^JjhziU^JjhziU^J5nopĠŠSTYklmSiӰ԰ٰ./4>?@"4MNS]^_EFKڧڠڧhziOJQJ^JjhziOJQJU^J hzi5^JhziOJQJ^JhziCJ^J hzi^JjhziU^JjhziU^J hzi^Jhzi0J#^JjhziU^JjhziU^J1-.I\ow(Kɩ ;KL*=RSi & F\ & FP & F & FO & F;iƮ bٯNx°Oiͱ[ٲOP # & F\#Mn3W|˸̸,=p 23:; & F\EFֽ"4bD)}l| & FQ & F] & F] & FoKVWXb !$*ghmtuvǻǡǻǕǻǎǻLJǻǻ hzi5^J hzi6^Jjhzi0J$U^Jhzi^JmH sH hziCJ^J hzi^JjhziU^J hzi^JhziOJQJ^JjhziOJQJU^JhziOJQJ^JhziCJOJQJ^J5w()8gh  & F & F]UVo0dDFijtwx & F  & F]GHO)*,-y{() & F" & F 56;WXYCno&',456mnsyоhziOJQJ^JmH sH hziOJQJ^J"jhziU^JmHnHsH u *hzi^J hzi5^JhziCJ^J hzi^J hzi^JjhziU^JA)TU!"op^ & F" & FR & F"CRS.nog:j&[ & F  9r  & F  & F734=q()^_d & F & F 9r  & F yz{JKPtuvzYZ}N ^ _ d o p q NOR[rw  78=QRTYijlqjhzi0J$U^J hzi^JhhziOJQJ^JmH sH  hzi6^J hzi5^JhziCJ^J hzi^JjhziU^J hzi^JDyzYZ&'       c    ] |    " h  & F7 9r  & Fh i N O OPQR[r,-;< & F & F/Hi9z(+ & FS & FB C   !!!"""8#r###^$$$$$%-%.%7%d' & FD & FT & FC 9r !'()B C !!!!!!]%^%c%l%m%n%++++++,,C/D/h/e1f1k1r1s1t122b3c3h3q3r3s3+46474<4G4H4I4k48 88ŻݴŤŤhzi^JmH sH jhziU^JmH sH  hzi5^JhziOJQJ^Jhzi^JmH sH hziOJQJ^JmH sH  hzi^JjhziU^JhziCJ^J hzi^Jn???@@@@qAA5BBCZDDDDD & F & F$$a$ & F  & F^DDFFXFYFFGeGGG'HIIIIKKLLlMmM|N}NNOOOO & F & FwKxK+TTUU;U?!"z2UM & F7 & F & FWMņ0 y9h7?zŒsˎ̎Ǒȑ & FW & F7ȑ'(ɔʔ?ҕ:Bڗ%ʘΙϙٚښ|} & F}œÜӞԞ_aqrʡ=gtϢТ & F & FǛțʛϛۛܛݛ`afԞrʡ.$%&-.39:;ghmtuvɰʰϰհְװ."(Hݹjhzi0J$6U^J hzi6^Jjhzi0J$U^JhziOJQJ^J hzi5^J hzi^JhziCJ^JjhziU^J hzi^JCDjkߥ:Țݧv.bc٭ڭA & FABxޯ"Yw:Qwst*+"7$8$H$ & F"wx׺غz{YZ +<=o7$8$H$ & F!()*JKPUVWrsx)*+mns}~ "Xl:@b(A %&'hzi5\^J hzi5^JhziCJ^J hzi^JjhziU^J hzi^JQop%&./YZBCHI[rsBRx & FD4kl~,-6RS]kl~ & F%&[\] X:bu%& & FJ[{  hi  Z^ & FXY56WXYefi  ~~uhzi5CJ^JhziCJ^J hzi^JjhziU^Jhzi5\^JjhziU^Jhzi56^Jj hziU^Jj<hziU^Jhzi0J#^Jj{hziU^JjhziU^J hzi^J hzi5^J.Z[}~deJKIJ$a$DEJQRS#)*+78=PQRopu~/?BCsefC R    hzi6^JhziOJQJ^JmH sH hzi^JmH sH hziCJ^J hzi^JjhziU^J hzi5^J hzi^JH.45\]+g & F~@o9tu. & FX & F%./?BCstfwB C     w x     & F hh^h & F  9r  & F^  & F         L M R c d e r 0349ABCijovwy~+,1HIJ )*+" # ( 0 1 3 8 B C D >"M"z";#[###!$2$T%hzi5OJQJ^Jjhzi0J$U^JhziOJQJ^JhziCJ^J hzi^JjhziU^J hzi5^J hzi^JH  N    3  4 |<r 0z & F? & F hh^h & F? & F4 & F4 & FY & F hh^hNIXl M0uv & F4 & FY & F hh^h & F?78uv>aQ&z[`st!! & F6!!!=">"z"""""##;#w#####$$$!$2$E$M$`$a$b$ & F2 & FZ & F2b$c$d$e$f$g$h$i$j$k$<%D%&&&&& '9'Q'f''''''((( & F2T%U%Z%a%b%c%&&&S(T(Y(k(l(m({(|(((.,/,?,,.../44466::<<=?=_=`=l=ͽޗތބ{ojhzi0J$U^Jhzi6]^JhziCJ^Jhzi\^JmH sH hziOJQJ^JmH sH hziCJOJQJ^JhziOJQJ^JjhziOJQJU^JhziOJQJ^J hzi5^J hzi^JhziCJ^J hzi^JjhziU^J((5({(|(((())2)z))))**$+D++++++ ,,.,/,?,, & F2,,, -5-?-U-\-x------ .$.>.X.i......//X1`22 & F223h3;4}4444667799:::<<O>P>Q>R>>?  & F^  9r 7$8$H$7$8$H$ & F2l====>/>L>M>>>>>>>>????@g@h@m@}@~@@@@@@@ABBB>B?BDBWBXBYBqBrB{BB򶬜}p}p}p}phzi]^JhmH sH  hzi^JhhziCJOJQJ^JhziOJQJ^JjhziOJQJU^JhziOJQJ^Jhzi]^JmH sH hziCJ^J hzi^JjhziU^Jhzi6]^Jjhzi0J$U^J hzi^J hzi6^J,??@ @I@@@@@@@@@@@@A!A@A\AhAzAAAAABB & F2  & FBB&BgBqBrB{BBBBBCC(CdCwCxCDDD+F,FgFFFFzG & F[ & F& & F2  & FBCC7C8C=CDCECFCwC@DADFDbDcDdDEEE2E3E5E:EWEXEZE_ErEsEtEGG#G4G5G6G9GyGIIIIIIKK$K8K9K:KKKKKKƹ᳧jhzi0J$U^JhziCJ^J hzi^JjhziU^J hzi^JhziCJOJQJ^JhziOJQJ^JjhziOJQJU^JhziOJQJ^Jhzi]^JhmH sH  hzi^Jh6zGGGG H3HYHHHH/IBI{IIII`JsJJJJJJLLLL $$Ifa$ & F & F& & F[KKKKMM N NNN"P#P(PEPFPGP3Q4QQQQQQQRR2S3S8SXSYS[S`SSSSTTT UUU"UXUYU[U`UUݾݴݭݠxxhziCJOJQJ^JhziOJQJ^JjhziOJQJU^Jhzi5OJQJ\^J hzi5^JhziOJQJ^J hzi;^JhziOJQJ^JmH sH jhziU^J hzi^JjhziU^J hzi^JhziCJ^J/LLLLLLLLLvppp$Ifkd$$IflFH x0    4 la< $$Ifa$LLLLLyyy$IfkdD$$IflFH x0    4 la<LLLLLyyy$Ifkd$$IflFH x0    4 la<LLMMMyyy$Ifkd$$IflFH x0    4 la<MMMMMyyy$IfkdK$$IflFH x0    4 la<MMM M Myyy$Ifkd$$IflFH x0    4 la< M M M MMMMMM N N NNN}}}}}}}}}}}w 9r kd$$IflFH x0    4 la< NOO P4Q5QQQQQRR*RDRtRRR STTTTTWWX & F & F & F & F/ & F/UUUVVVVVVWWWWW%X&X(X-XKXLXMXXXYY*ZNZeZfZkZZZZT[z[\\\\\\\\\]]]]]]]]]]]ľľľľľľēhzi5\^Jjhzi5U\^JhziCJ^J hzi^JjhziU^J hzi^Jhzi5\^JhziCJOJQJ^JhziOJQJ^JjhziOJQJU^JhziOJQJ^J6XXYYYH[[\\]]^^``mana8c9c0d1ddee/e@ee & F  & F$ & F[ & F]]]]]]]]^^^^^^^^_,_-_._I`J`O````vawa|aaaa1dCdDdIdidjdldqddddde/e@eOePeUeheiejeee3fKfii8jոոhziOJQJ^Jhzi^JmH sH hzi5^Jjhzi5U^J hzi5^JhziCJ^J hzi^JjhziU^J hzi^Jhzi5\^J;eeee2f3fKffgtgghhhh\iiiii j7j8jgjcldlWm[$\$ & F[ & F  & F8jgjjjjjjjjjjjpmqmvmmmmmmmmOnnoopppqqq q*q+q,qqqqqqqss$t%t&t-t.t3tStTtVt[tttttt찠ДДhziB*^JphjhziB*U^JphhziB*^JphhziOJQJ^Jjhzi0J$U^JhziCJ^J hzi^JjhziU^J hzi^JhziOJQJ\^JaJ:WmXmNnOnnppprqrrsdssss&t v vixjxyy{{| 87$8$H$^87$8$H$ & F# & F#[$\$tttBuCurusuxuuuuuuuu}v~vvvvvvvvvixjxxyLy{{[{g{h{m{{{{s|t|y|||||||}}}}}ڴڨڴڢ hzi6^Jjhzi0J$U^J hzi5^J hzi^Jhzi5B*^Jphhzi6B*^JphhziCJ^J jhzi0J$B*U^JphhziB*^JphjhziB*U^JphhziB*^Jph4||}}~~?@:;+, & F# & F# 87$8$H$^87$8$H$8^8}}~~~~~~~~~@:;LMRuvwڂۂ܂݂Ńƃ˃ /027abc΅υ͆ΆӆIJOklmħħħħħ hzi^JjhziU^JhziOJQJ^JhziCJ^Jhzi5^Jjhzi5U^J hzi5^J hzi6^J hzi^Jhzi56^JB\z؉6Hm~ 3<HTX`q & F0׋@AklmnoABCIJĒŒyz{ 9r  & F & F[ & F0mopڏݏ%(=?\_kmŐȐؐڐ.1;=RUkmőȑӑՑ!?@JĒhziOJQJ^JmH sH hzi6^J hzi^JjhziU^J hzi^JNĒŒy{|`c<?~rs47ABKNܝߝpqȢɢ$hzi6CJOJQJ^JmHnHu'hzi5CJOJQJ\^JmHnHu!hziCJOJQJ^JmHnHuhziCJ^JmHnHuhziCJ^JjhziCJU^JhziCJOJQJ^JmH sH  hzi^Jhzi5\^J5ٓ)7AVg|ϔܔ1cs}•Z 0 1 0 b$ 0 •ؕ):IWvٖ3FtԗZ 0 b$ 0 1 0 *5ZuŘϘ ";Kfę '<LYi}b$ 0 1 0 Z 0 }ؚ'3;McqsЛܛ$ObsZ 0 1 0 b$ 0 ڜ!/@BVbǝӝ =XnZ 0 b$ 0 1 0 Ҟ 8Ma|ҟIs٠>VoqZ 0 b$ 0 1 0 ˡ&LZlǢɢۢ2^uZ 0 1 0 b$ 0 4ClΤߤ I]_xƥץ2>_b$ 0 1 0 Z 0 ɢQT^_{|8;+,$%$'NQNO!"ʹд޴ߴSöÀhzimH sH jhzi0J$UjRhziU^J hzi^JhziCJ^JjhziCJU^JhziCJ^JmHnHuhzi'hzi5CJOJQJ\^JmHnHu$hzi6CJOJQJ^JmHnHu!hziCJOJQJ^JmHnHu-_z|̦1Lnç*,D[q|1 0 b$ 0 Z 0 ̨#%5Meũ2Y|ΪTZ 0 b$ 0 1 0 Ti|ū׫ݫ ?a|ڬ/Nktb$ 0 Z 0 1 0 *G`p׮(<Tmȯ߯ #-G[Z 0 1 0 [gz԰2\ )Wm²ֲMO[b$ 0 1 0 Z 0 [}ʳ "-8I`tǴ޴ߴb$ 0 1 0 Z 0      ?m4XRSTYijkѵҵ޵  <=>?@NO[ghԷշ;ܼУԙܮ܍~t܍jhzi0J$Uj[hziUmH sH jhziUmH sH hzi0J#mH sH j.hziUjhzi0J$UmH sH hzi5mH sH jhziUhzijhziUhzimH sH  hzihzimH sH jhziUmH sH );<=jklmno|}45XYgh{ڹܹݹ޹"OQҼαڼΣңңҼΘңҼ·ڼңҼjhziU hzi0J#jhziUjhzi0J$UmH sH jhziUjhziUjhzi0J$UhzihzimH sH hzi0J#mH sH jhziUmH sH jhziUmH sH 3QRSκкѺҺ:;<OPRSTUɾ䣲Ʉ~ojhziUmH sH  hzi0J#j׳hziUjhzi0J$Uhzi0J#mH sH jhziUmH sH jhziUmH sH jձhziUhzijhzi0J$UmH sH hzi5mH sH hzimH sH jhziUjhziU+R M4RbbA. !01=jlmn &.OPcqstu]^ޭhzi0J#mH sH jhziUmH sH jhziUmH sH hzi6mH sH jhziUjhzi0J$U hzi0J#j"hziUjhziUhzijhziUjhzi0J$UmH sH hzimH sH 2پھĿſD&'(JӽujhziUmH sH jȻhziUmH sH hzi6\]mH sH jhziUmH sH j:hziUhzijhziUjhzi0J$UmH sH hzi0J#mH sH jehziUmH sH jhziUmH sH hzimH sH .JKMNij}   1245PQdvw|ռѱռѦռћռ덄 hzihzimH sH jhziUmH sH jhziUj̿hziUjhziUhzi0J#mH sH jhziUhzijhziUjhzi0J$UmH sH hzimH sH jhziUmH sH 2RSp-./@AKL|}~볯wjShziUmH sH jhziUmH sH hzi5mH sH  hzi0J#jhziUhzijhziUhzi6mH sH jhzi0J$UmH sH hzi0J#mH sH jhziUmH sH hzimH sH jhziUmH sH .[\  @ABUVbcabcvjhziUmH sH jhziUjDhziUmH sH hzi0J#mH sH jhziUmH sH jhziUmH sH jhzi0J$UmH sH hzi5mH sH  hzi0J#jFhziUhzijhziUhzimH sH .%&LMN_`bcAB-./0颞rhhzi0J#mH sH jhziUmH sH jhziUmH sH hzi6mH sH hzimH sH hzijhzi0J$Uhzi5mH sH jhziUmH sH hzi0J#mH sH j/hziUmH sH jhziUmH sH hzimH sH jhzi0J$UmH sH (0&MQx|#$23PQklhziOJQJmH sH  hziCJhJ0J&mHnHuhgl0J&mHnHu hzi0J&jhzi0J&UhzimH sH hglhzihzimH sH C.  $dN$ r C5&$dNa$$ r "$dNa$r&`#$$dN $ 9r %a$ !"#$%&NOPQyz{|"$a$$a$#$23PQkl$a$""$a$" Z"  hzi^J. 00&P . A!n"n#n$n%7+0&P . A!n"n#n$n%7:00&P P. A!r"r#r$r%2 P 76 00&P . A!n"n#n$n%7 P 770&P . A!n"n#n$n%70 7%6 00&P . A!n"n#n$n%7 P 730&P . A!n"n#n$n%7 P 770&P . A!n"n#n$n%70 7%6 00&P . A!n"n#n$n%7 P 770&P . A!n"n#n$n%70 7%=0&P . A!"#$% P0 7@@< 00&P . A!"#$%0 7E#@90&P . A!"#$%0 7E#@' 0&P . A!"#$% P' 0&P . A!"#$% P90&P . A!"#$%0 7E#@< 00&P . A!"#$%0 7E#@`!.@=He-Zj`?7.x]$u,g%Y|9!k#hln)]2`@"8"`1@H ʃHؒA| $b3/ 6$ {gg>nUWwnMwǩ۷~Tݏ5th!"W6 +o^?Si>`Իg:?~c)lZOۼ\[5+zH |!=7޺7EIJ:kjzUSOtK5/w˗lWvwxϮ$i\ST9<{~Ηs~}}js:/7OJz%-y=GE7nrnrs=st9tW-ݼy|n߾Mݎݻ]okFo7_{(oFHJIK>7ߢxy9|{ߣz~z~y]zW/;C˻Kz'Oz?yч~H}/?1}?O>>O>S^>ggN_|V*0 `0 `0 `0lXsL&/P#zu0T{Dg(zHv0!p+>F琁:`]ٿr&^BSQϲȓ!~bw@ts?Krő&Xgn%&+|"Y/oUͧnH9!3ز5fg'%eAaVfo<  J%>J-Ts),h&OHX$wZԫ-zT5H#} ޠ|$go!x[I,*ԘiRt&C[X$Gӷ8S̲7>n$N[_EUUk0*ewpǢ%lSegO4o>>vZyzD^$[<ŏ TEdo%CzpjiI:}~LIw? K\hBߓ|!F`0 `0 `0 `0v !mwFSSYHG[`z4 |-㬙%0:ɖH;AjjT0<P~ҝYP|Gf-Twhz _21Ꞙ%;˲qd]' E"B >w9MyqKY[[4V-4tSE=C~%n,@9mN|dm"[Ukݕ-gSL弒79^\iJ:{BTXJQ'GYj]F`~?!DBg8NC񉏴 jjE4PS]XIRPK]u'{7hX^XlkK:ǚ1 1oѷgb,O`m-=M^bU֢ͦt?&;:ޡ-otNIJNoE{̟7}F)dn},I o?N*VU(d'f]3RT}Clʹ;V)J{q#jHR}7뉖&D_WLUL-ʥo_6Kz'祙lww2V7UatC-8mpUz\V_͋+&Ճ%)yYeYAh{o1n:G wcNUwt'WH.ܫd\2N}1PWINz:١x?ѷ^KQiJig)'m(mkWSC(#.PC[Ѷm3/SW}uF@4sΉtFyPKtpuP|e.ҙ<5åIDr=L\NWF\۩z"[2AtqVEFmc3:<J-\~%~4+$ T`0 `0 `0lAVJ~ixo _7Ǘo 7(gv}54o 7xCx7xo x7o !^@xo 7xx7xo !^@xo 7 0o <[s?w/,'oZ0`$pQ臾/GҪN [^%zn6EQ-t?|rfQOWO4"*yݶb.e=5Y R2OzoNShܺAC ʘ݋m8S&Sx7ޤ;=H7VƸX7NاxD/ رx+aұ-O'̛G5mœ=$׿ыU[ 2abGf?=,`7 qʇH},< D ot1biҰ\>xo-yn]ocZg/7x7V7 -$o8xo5{́ }ozcV8h i V'kOae !^0qv t7Vcj UX.x7:ۢ~M>C) ^!. /=%@-З-Ӌ겪uU l2HЁ V7')&M,<)} !)k+-I9&m2R"9kUx~E0.1wCP S؎5x9VoS:l[78ݫ/u[pB":Ғ\Y}۲>7N~brȷU6g}M9Y[~l.FE|=i^Yw^QX-B󏙏2ކJ1Th׷'R;[mѷ7zJǵ.o @[U|˒1{ao[7+C}I_P>G2 o\lǜOGC\!Ԍ,I [6EO. 9<~VR[x#z,o ޢǫXYb" ۹u$tM~nW%x[1w [> #uHX'xkG2개a&y8}fܒI8ď6jn&I?h77 #fcIƋR2W-mY=ST)гzJYqzDݜ-K\RT/7[u92\]-FnzBO4FŹK[4lG}peB;o.N0Ёt4H-vq_Z>Tm3Qˌn܂Fb*:oFn)ҧ"+X3WXPWY#>UE2{o-I t#Xvm.Υ0AcOX"DFa3:~o }0Q>(i<˒iyr;AB߲==? =dRRRO-\2nj(ҿ>U~[8BD`l0$3K:\͢F v󅜍!dʡ!DҖcWEJth9$Z,mS)nmJp i;{?d-ROLabf$Y4VZ!Lqb}  mƪM0IKpv{[HT.Jxj$,5ߖe`|z6s,T {{XV'{[TU^#y4VQ"ôU-#҆o. e%ԓw5eQ/*R׭[TFC0REaB񑲆o(UtTxܷ"eoR|fypee D9X\!R}sfoc}  Bۘ/-ӷ-{4ZoY7s.o ])Js4| i[xӕ3˕ N-歖 h,7oLaV8mGP9{'xamI5{Yd!>aQ)n-yZPaQn&ofZThvY$ΨQn&oޤ+[ h`,3QB>dqkZ4ydb.S66Tcf|'ּB*-˯mdɥX:WTKyA6pKx[ܚ.J5m"(rbLN|,=k8<=ۭ2nd9q;}?mˢ3c3lWZ]݊QlV$Rϟ7C6pyy3n+ΛRd)4ÛyySp{y 6^MHZ؏ś4ָ7ڿ-~c)Վʛyy邏S7ry]YfVS7ō?ԟw9od7 ›fI݇vg )QҔ;.4%ӸvVއ{|iL<\P%Vo[Fxk/ogvK`qoA=.[+poysN<*flg LVXި) 3 o)vN6s`CE-oko%x;nL†o ƛqy+}F{. x3D&[,nmMNY@[FmB7-1)>븍d#x+LV7p[7VR{7$x[: Tɕ4xk:F F. xk7ø> [^j!nmms^pm C<U) GqCM79#c 7tJz)#7676j.B 1Rq.R[x[0y;i}୾tµ7KF%o[jFfqc7i@|RH2y3FۢVFqc?GF5QyZW-nʏƠV_`J޲p66z-o풷g-V8V+oMc,u86ި n9U"sqCl,M=o [koy]NL_i(Jo[ÁVx]r ˲i; G tYtWȲ4қB#WʇFy3S{#ӥ)]Rvf@,RШy Q?JW}[XjxwO*oykox(DR:ܭO-͜KFט5-m)Jo8o.̨wC N pYmo4a ma,Pˠ X4ogR\ ͐5[RS wmYx bOMhR3CeU(}0o?kx3 o%LpsW"9ƴuI|@:d-[HwXB"W+o6ʛV8ng%춈#KVJ*U-/5}m{PǞ#R"ٮ72.odZf;]*ƧtV dli:KVȽrክFp!5f ooխ{zrqA:[:GiE0Z>J SFjP߮DE^oM2& [7C >,\ݾwg(omMGnzEW^ޭ!x[ޚs6 od7jM6Fxmf򸁷m&S2]emƀooƋy %:n h}7x3YB8o4_܎m PY`ފy3oqxPof0\TpgT'Mtoc{чd9OROMtUt=W~AQxkqr`x4 T!/6su=mM /ܓ/ox=|}O./wLnwvȽx뾸ߍGvyawwD㻿s)agoG΋,ʆ쥓vԩG>8'{ϟwCx 䭮^W /{$2fݺw>0Ki` :aEyS.[R^G!o?z^ v}te@N8g"s\m?-dxaOvT{{CG8{{'6qO4&ثP_zaYpʛ~iyME۽vwU?XҦת}vr볷.^oC]ky98jYRqSݕ:ao_K>gWkzvwO}S_lȸ\O.Dn2DҶCIAŒf4)C(m/7A}Y#;GZRc=9)F㔷ݗr]L 9$o^pJKA0;{~,_< _y!|1_;;^>/`8W]ga6+*uo7ÉSl'#)^y аsD"#HbwcV ([[o UG<3aG^ˈRC{z|uzǽ}UnE/SP׻3b|{PdNdoR?>]oÅdEjEnfx+:'8(os7xnnd8ZXk7Y ިo K\7V7Y7s74-ZX`9:] 8]{o-'od72-oJ[tC ?|=3j}UIT[Id4o%-HЁ^,')e$B7G;6}a5̿˵^;}3*vvϮc}W5[| y]gUz5'Jyp93|+]~{ygk>ׇo3'Y^P{Iڕ͎?YSDv4/Kn=ɚo~7rv;km_ͭ쮕ͭƹ?מ_s3Νd_#^.gx{T˭ zv}[kt4_]W>|$oPy&,?Oܯo:_ %_B,K^C_v_䜳{e9ΗO^WK_9w~]ro/ͽO;nmmbr"'xپR6vtjg ^6Y/7?K?];>7_?w;5/{m/s*a]w7nu?}1ÿXo;,?L `!W, $x #NX `Eh;%,xMVߏzvl\-SmSFTD 8)p_*Oxҋ,^z z,y/^s?Ȫ.~\~GbX$/_=Ec G?'ao۴\~S|O?"_7ͿϞ-} __o~'Z+R~9 -Ojoj7;o}L?.ziYwObŭ?qUiGӟN-2/?qg{#MIMMz6ަ8bG7C1=b`~mmgXNgl }OÇØ?~L<~)}'?>3>?>蟾bg"boK__A_?/>TW_З_|E_/}W􇯾 }ҷboooH~-?O?Orw}O=?_1@?~~'yda0 `0 `0 `0.p `YL.0%A摚/bEp!ejX6[8s'Q cP&Q?8cHTl6$v"˖X䥓˹CLcS;;/cO9HX6sZ&"؎'+ɟX͉R~4O=LeYl'k.YI(/Hr&rAbBhH=RZMιc˯%DԷP[sKgox$o-$j_)RTylK[Bnd;G)fهtOU-"o,u䵐+ e6p˗r 巉/XM |Rj0 6DD~l[eye7[^ӷ +ҝ9ͣTAg,zJpy̗:1$*>`LbY^,J隈:^E1cNrX> 6|Ld2<6 7Fy*.iitc0y1f[ cb&lRl0߿=͖{SÛ^ grI(/$0 `0 `0 `0 n:KƘWm>vsPU%vyS>mF6€ {UQMc}VMcRXyA˪FU,fʋeJs$͙X UggV#J6_]LuDzybx.ўqjdVMכ3 MLՅdBՕi̪dl6ѓϣ*²fPP?tN/dvnzزn>#[o`Hכ˦Y#m&kﯮd^*zHntJ)yFZEYj]F`D2}ClԒ$=[u㵏/xi. kI_-cq>-JVڋ7AbP]SJA}pXu6ڊ UJ% :pF.%R`{x+cbNhTTZoV}SgB7\JZ6`1\7 UH7>̦YY#&]^\&1-D*_W~16Qe)S,ŹML~:Wm-?ȶҖ(m6ryqɀx^"OzC[n[7ѯmw5Vܞ1bxbZIf,lŖmy@"")#^#>P2oL;L#ۍ+Yt%o}.bb&L'﯐4ĶZ7KfBPckyL;^7-?Nm2DBgJȥVgJ7 EFuoY39gDk>oԇ[_!d-bZO}QW9y}+ E-,[hjY~s,?m`/JmԼa[=nf>y2ݎrAE9ߎx\3ɞgwa@j zŒǜJD-__y޻,56odܡYE}\-Yo-~94ވZscJFWg=04[K}t#gb~*mx_? f@ t$nuVx7Yd!Lb୫ɨrFi[-t^$fvF v!dʡ!DҖ[=ږ3IN92KF;GE?mA.?`}j)L܌$j6։X'i8piE:mVڣD 5€r7.R2U} 1[v7mL@Pcy$sؙ¶C9Q`jo[U~x+XA Vk,yK+y7@e%kr>޲Ak⅖r yG*TWPuwS}++-S|u[ (Vee4oLOQo.%]~cyi"~Oh[U|S=ee6r=U{S:' [R3YitŷfCKBɛ*phvjoXk9歖0̊|rM3G?Y}&ȇ\NY79;lħmʼ05tuk m `TG3˪&qK|r[y&< oLD 6Fp4ydb,Sz[ 㑪{8_^ڌwޚX^Hŧe*U mR[*-ӟՋpM,[O|u\[:|]e68]}uVFco}K|҇,I᤭ƹu[gV7Ul+|7oMrG?A9vx;1 %"m^T uGR*zioLEx>AmۮfLLgmp n :6pk"+oz,ۜ nō̊[Wyuڹ~RM T ʌXJ`V9UAoԩ ؑH6q2'S{cCXGt7Fi+c2iިcψ'Dbk9Nf+SG&uި&prIވ:טIO#ٺ:N&()}pFXZr}bOBBlIMdfczkBv,ifGz 60yQu4> ȣw%WɔSx<^#RE諭H4c\)t̗g[?ѝu'^rUƍCoJlGX>dVdrrPMܺ[Gnf 35`҆i(oIVƜ~qmhf~R2Wp2o=hM "v6дj-+op+)nho­ɬtmͬG*ndPiqLx3Jy4nPjA]Rܮ[\fjǨ7KU3Xv#%72+nc6*poyq3NxkMV&mm_n5x3TYq#siKŭ؞9ofZ5>(~޶d [bؖѵ@!y7o-θ7Y)xkp;[m[OJ{ycL㭍`a}GU ?eQjo[wyY Vܖ $o uFfۨp9䭰Qaw g 9x o)vEr`⥷]Rr&af\y;.gߝ d48a" Kzm72 ok G[^Wd\ls&n|\w2b4nyS wx/xo%x.u|nq\@qj2^xoM_(тj߹0nZmu7f%<:x룼,ԛ~"WyJA8nz&y]Q82n 6pQKoT2M/(/xk Z(۲>\ԇXpc08]v73yZ is୾tu7KF%y/ B*O Fp[*-U)ZơmK˖Ωp=4Dӻ6'C~Vs[Ȝ?zKf~o xRWp=`J;[OykRު K !֔, xJV72p4 >(oMvmhoU,i܄C ޚPyjW,-nҏƠx/Z0%oY` :[q[K}[n]a[Sp-GJd72pv7)]R'xQwܹ𕆢T6<x[MFq`]R[ГwFm'卧~;p=jŭ r]5Unц2*!^ ommRWKh os #B?s ޽{O[x3Umo=/d3C,Vsp=<|kNMRUtl[oq[--íF,T~:o[ތƍ(\!}ۡx!y,ODpc"kx$: [UbEcmzM1Dn0ӄslψٶrX[5#3bt_Pgw)d#FjUD;8nYLLtCT͡9!X,Fj{rkf)<(M>IUy[z~!:dp7k~؊9%T ֔?$/XlvA<:3y? i&8-ћ,éwxe?Xo<ﲙ(ԉT72-o|rCOtyfW3EUB-j{V67z%r 7>7k17sfxKΞbBƷ%Md[sG xmԔzCսO/IM}?<w/z1>:: c1= G5 Of'XyX;O8;Nwaz ~~7=S{(-τwhOjz!~~9x+4d[扐c`bt4 :M<=OX5E?CFb;R{QDxIy U䎩-F~o oӔH(ƻ+oO::>^GZۤƉmb18Xy2OV^O'Cf-oˣR̓SE7Ay>jᭃI(}{rw8>'OOIVҦM|+QEQ N"6N?H1TG{&ku9.MNNtV oF9(w:x1nƫV´ ^폢MV9\9ZEV\]q~b0>ۘG୮贞6PZ7xnnd8ZXoh/3 ިo \7V7^7s73-ZZN7A[Oӡ={o9y#㼑iyCPb -: ȨEV-NQmtn JZb_^laKlY٨mOvxv ޺baNrHH)dmTJwks=*v˱nv|p'ы]͒l]4Qs*y: c׏2qJmn{!ַ[o e  fNlF7Wȍ&VFj٦y̜l'Ds Ece:3oy )̔`MY\`0lAd k|ƒ^5@ՄS}7ۯG 3elĄ-(Zv&;q`ycjI34-jZŒ)}$nѲ7KsEգosUoN?B7z;(j*&-/ 0oOf.cjp *0oƭY@=7?]B\a5Y)ua0 `0 `0 `0 `0 `0 `]7-w$N[X>+~lCdDdT$N@Cb  C >A&Provisionallogo_ENb}-  hqn<Dn}-  hqnwnfC8'v-Gvt>xU^ϡkȬS=d`Jڀlhrş^g"j|䯁kM_kSRf hƘs#IWCTa\Œޢ6.m/1FkR8%,# ڟfAӏ̆I4`$UL:B ՙMI8 :N<\;POYWJd6*{ul9eCl礇-·_IJ/eN{~p?ĿCI_q70a+Ԟ]+t~U#yHWe6jʨ3  7zjq|pcȳl R,~l1ןFYx_0CnB4}[u:WxOq>~:s=}ˎd>}OpRy^|GӲԸ==Ip?uӢ-MFi,cZ\m-HRwsene,'aZ$,}voIEq{thwyT{6Ƀן.qkm;'}%y"Za ^"4Aoȕp?G' _gFDVF,Xv{;vƍv~%a`z/*ÏʁmfyC*q0j< XD]Z;j(#ן޶׸Ki޽+amS.-!,BR_FѤp1 721gz>%A)~ ğA+q_\t :U8љW|?wՇ?J'_GpȎ]v{[?R#Y(&[za&$s'UDR }~ l)Otl Q" f[lsP#m֟XO {L}<**m-c#f;Խ-qi='9 3DQ!G]kFm8[#l~n>@?1fnTK5Fӣ ܩjM\nc-Χ#*xEjK p`Cۑp3*xƼѼi4b DU1M̍XFT{v01x-ol>xas3+ S~7Oo}-.?`l~g8nRK~3@v h&El^H[ >{'f['[1o(wl/yR2B 8}si JkXVxz1m3Gjz]u& *\Қcitmpp-/f-]1de;[cUQ+վ#fsǮW̶{[B?RnfK^ԡp׫ɏ>tUW wl@ne-}ǪQ,.!omKW}ARǻi}h;Rhy͓6L[ۭ٤m;1s=^j;?v}lN67"mK_N V=+|_+F\<!mվ\s6z'jܘnre1ۿ4n,W!)=Ub4R1 ;!g|eFG:yr ±G/>ܠeTֶ6e+A\%s5 y1oޛ=ٖ/{8I2!WhV&=y\}7c~g̶=#.hq΅aJ_ԓڮȐ ?cjnJ{΄'?xŋߞ? 'Aƿ ;}osiu\k77b6*fcG̶1 ps{g Yxovר}Txwb6Ƥ8umk>b@7ZZ>4.xhLY5WNTsDE#e?[tafCIݍ >YERa+־9=~ǡ%55*w=%1ޢIj#ǯ7ݷh,'>M;> {ӫ=ţ IaޔH+?p$--쥾D'<6Oe̞Z\2a6uVrL{vqsj#H}{E ʼ_:P[k`Gޗ=tT՚yrNW#9 sx Ӂ聵S_1<~+VqY|-:̶>?n(T,z We0!+7X6`ێm`#Q_ij>jbSeVrwSh6X>Ɲ_f\l1r˨L|'vM0̱Q>TGaocwݤx(Egn/MsTml=È,R"9ulz|ɽ2g Dj==^}qL3k!nDTh<'&>&npȇb~]L> @CY!Zl]Qƻѽ-svUgvCK_WkSk= LOV+jHo$w^o gx$/q׫nsZs{T[Wbz wqIzh=:Ϻ`[@5U퐼'5]שJ}BWuz_::r.f+K4t麌9;hoJ`7 ʹgJ6_+J`~ʆ.&O?).7@1^gu:/ ֛.>f 9; Xz9 !\L}rw׉z6ZUHuj|km6ôsv7`߅ٗԝnKߠ $u{drׁ;]CٍqwJlivQžhNb6܈+ӅNfՠe^OO抿6-Ìb;u،Y; ^%V>ܔH`l6 jܝ!;}8p G_'M7^6$51։TgϗVy2SQ_&GL|9BZa\&_QM}8sńJ?EWDmOR&_zGzaJnS[;qpS[8-ٳ~{5^YnW gn4v%6>Yn~Ls ~]|٧֤4Uv|ַ+^v,9EJO`5=us.ďŷ|gw N/O{vM6K*fE "J.f{iK`lx\GEUw2߳$18ӊS DqkMoO`;Ә[ra\?Y7)ݷ?GK;noUWbuð 'ˣ&x?Z/vO:-9t*Ee5]hhΘcg @ˣP.H;yŸo+74zz|g&=\;қ僷?IKHΎiE.vcbD >PYōmucHc hi9("G>4=孛?Q @N}o-,ڜ@ȩhudP˗oKJTc9+5SaNǒ$G[jzhx?P~8M[%G<'{v8q~+x_QO[GmÑuBɌ$霛>NF4>~|y:}i^7a4GXQP9v釗W*r@?ns6Mh_<_eB59N>=kC[ "x{.әoꜭR!Okv3-vPG=8pv/oE/w͇?4^^l>[x&4+Yk;i×d7pۭ[qßUqgg?U.q9vTbx[/$tV'ޚaӁƯ$|@pgWӚLq fWv%ẵ[>|1Zzӗ ~O2KcLwsO$[YѮl:SO i9S ~zb'D<<3HK\'fkBpUњ20oI ,YS1%қ#-2& Ncn,VnN+`,lt87G0uuDeشKk,Nq8KP&W%l 0MVr\>B7G$4B7ۋ@TNp&sա3cI+=fniiXK Dy8+ZAwb3 ,ߨpdͩs-7G_)i"^Е.k#[׹xU<@k9F/ϳlwu8N0d6͑/+-.Ы *' y"5gNN{=qpI]2ib ы ‰+VZf#cb?^CѨ=hOc苈^EgKcʽ=UgjÀ3Li>DКD"Rk6 H]x,E-Ny7_5f#K(]s#'E#;Ńsfvڹ,+% ^\`rLGG Yme"%в+y]cO ^ݍn\4ikN"[lOy.iO~.u={ob6S$tV|& "術k VQ5#j#Qqx9 B@hn_eݓ-_z1M;z{z Cy^>!bͤȳ qIoEN;{6*෫b{yҍ|}gJv&`eŴST.& :Xax76 [%G/qqXm^)?Nҍ]qvwøy> o[N]NFkSYKBh4k,)ؚw(>(n|#`K?:z tAHYKol$7-:ۇx\Ibm~l|6x9z>ꨊ~WP @: e0mG/`K'^/a>v 9Un`!OG*\I`kݷR7ʧaܵ5zG#[})ߘ2IUu !I@H⮼t -'2~^F]AGgPt~N>$iYۦjWEjHpOjؽnt`=  F6LX d -`E dB{g/; Zݠo?P\~^e ݓF7C'M /pmf.!` %-(_-h3wƹ UʼnjgG=W ֫1 3#AŬO/jW[WUujn>c7.NLc?d _{ qu6z"}A(^GI`lL/k.L =yi117n4 ~YGYd5IEQmX..reZbQч<<46q< & %nS&?Dc/~q4%PE}}Ri0 3W/,͉[0!xi6&V,Vۡom4@ -?>$9Ox$XԒiu, (-ZiRa\C2ʂg5U0YíË&>9-fD>6:RƅYY+%Ù;"+I@C'1fFdZMxx1>^r&gR=`!8&pI4_+GR. O7pC޾R\QwԹZ$ąϔrNOdE?L0"M#G@r$e7u4:I0X n)^i+ֿAVBKg΀مc}aZlH5%9mJD(Ds-?.W%~XjFw5{EGQ Tdv^ci K8y!Jqn[՘ QD$ h?b\`)XjNbbh y'ѼL@VBӌnKrT55OZ2; l6~j|`y9ܚ3TMxʊeY$d.< M ׂ!Rr6᪠>ޚ"A 2uw50Srpď!C'b] \cYȧ, %RP"ZN*Ŗpe# ew|@ʘvBܫ'tBg񚡩޷0w E26))B QJI){y6RvZO#3 ;O1bC@:*#ATU,%2h#)&DW8$mM%6'6FD;o1!x-O^+E~NMnx1VY h*2fkK1E/+QCҦd.1W,@M̉.EZ&53EIjo2?G E@(kAp4)wOboLSE>J{";j= euݻ-|1+"e%mQJ[Yj:) b՛B@Od g)-Ojh eZ +{*"ϡDo~27 j.Z==mqK$ 6 @XW 45IXC6b Jp`{<|h.㺀pe y-Dң\ N EDa2;D'c,?@) lpfEO :e`ʘW @hՍ. Nq{JgYӈ2H) g%zj0i1^QA"022FE֬e*r( *U `{ؚ|aO쑆9Hg@( h26d&pY\-Fc'$l16(-vCy/{j>-#+.}*`nPo;9 b2`n>r! {knvR?F0%fQN뻧i`^UIy$^ <!8n78nY{Ri#RN6@kd)?i U'n醆L3]Í.r9ҹRSe[^^Já^p&x sT$zO J ?|2CgK[t>?P%sٽy60u,$D+<+%u: ^d$f[̼fjCz<=g*Ӥav{Zpj$ҙ3 wQia1e0GU45Y#fTB@nvwPV$.9G&pH'm?h8n#(ԍFnV@l 6ON:١C~{Qe:9ȋz6A#ɧ~2$2(8CDPb翨{}/D^d9 DGld,38fV)4-s܁N'3wiύH XI›j&o(#Ni-bCcCq^DC- LWJ9F!N%Ə\/iU~Sך|0o/m! XBm$zL]*T؝7s5B4s=,T*њN`1Vǻ-o}ZAfbV+N̽2 ?!K@͉P=0%2# J)—Zy!D2 N=in( *. +}CTۗ<ʠ &#v;$[1f܂Tʆ䝤1[nlu@p21aQ<,}1mZ+7-?} 1XPGdAol 3o#ԴUV;u;[&`^2jN4աr]6hY!ԯB?%T+,$th[ A,ZkViúx0p@x2;y"6޳4b>mH4>_W1;|Uim4]rV0S`yg"9XyJF% ]+ 0we#P\ 228.(_n=> HZv&': ]  꿱,Z 70n{GQ?7 DQWЁt@NG(1n˥ TFM?WpN+g[N*Wq9.,MW~$j܊ShA;IcQuX nN$\cK8?\o:ϴ#2u(̏Fdr; [8 x<_pҝ A6kbZiN#unK%SuqOa/$G4Y8zUS}BW\FLI*2$Haj#iԠ} 0! ]ѣzV~f ciꏂq|s>-o ;)n !?ШfB6#Okn1:2P5Q<0* ۩"ӂ&%MxtJ䌳糕7ÖQm#W8ی13i j,^&|5zzxHp(;!X(ӞL+Z6[SY<`l۫2[&u(:H3ZRZbj4u|AS[w ӁLJO˳kjWƩ+XP Df Œl'_]Yo|aѭm@RcYIY (SMQ.L' 'gE^jCG8T"HtЈ>15~y["n!DNvj.)̅a4Hw7,*<9}\*!nzhh &)*>su~Wf6Ihit W!F$s\Vگ2T΁|^<%|n+GjΏ<<;ݵ"@4FYSLǃ@9X7,>aq&rLeRӸJ`?,ƘoV֭V^5᝺3J oDc{ *JTKoCJ(OxK/yFY|ib\ 7Ѩn(,vSvW{LjD6Pr]Ni;2bnQo ldu/vlܩ RA~H(,`KpsRez*/ׄo~_mj2)  (?Rjː˘_e~%b _JQP7BQ]cH/I+(깻y8eKdH TԪEZh`WH{c̦[|2oM~Uf;[!*ZR,eyRkIwoz'_J+ͪno(AD.!T0 mc.O@ k%+Nu^A)Bs:6|bFtXd- * Qs|g(GIe4]T2.ڍTxM1d~C`+>zlީ Y L) qQnI`ԜSDq Y_q%:TM' Hc@7*&٤@:AY-h*b=[~?X[΄4Vyl"&qb_ ,kGT򍁭3`3 uӁ-~U7!M#Y∺Å^Ԣ_?b#{eDRRg_fȿ04]d Ef7lrz|&xGY/Fcl4i^žuyƤc5y'gs࿜8Jv6)vg SJby\͔^`c@_-,w%fRocb*W 3. f4(kP|:="yX^X.@Fdp[`$-M1@.Y>6 7z^wVɍˣWrVJ9 b$!b, %Hs -Tx!@P,U[5 ra[ʍeW:X5UհFP[.z8 %#3뎬}ʤ.4E)zXh!o!UnDPRnb\Y7 Y3 b|hM,!SEIǃG+$V z4+IG%X |~΅;`&И_}oߏUAHBEh`-#T3H^X0d| p2+D5FQ6а[<sɭgpwls=7)#K^\ 7K\hTtQ_ V%Ywd ɩEqTn\R| ]hk+xdG#petdYrRJ Q^2ѺEu~rXZ>0RZljU!cZjnMHdTl'Jq8],b/Ie=0`^+dQn_9/~*-ReZ<ȾՏa-JF@qz"]-7sg W存2f&90F$.JOd)@AX/B'AHF9C,oFر"Ai/WkrV(hm^sXmqĭAe[E5eǩ xmhn:ovw ;u%"b7Da0B' f-B^EA &DUr7^ףDWI4#Q1j1g8l5+P>J { Z<⫎CL9HE`Jb"sܒrMqDa:U.eRž@ 6:4i6KșSy)JrtTtTQ](Nwtfњ{- @/ZcQ`#3CI9k!qe= pRT*MY=Ra m ')ҷ#yQΊ{?ڊfcJ;A7Bd;C2Ȏؓ py\ hXmUwh8Ճ! ~mj18l{Ȍ Ow;Hl ĘRnv)'*[L>(lTk?֛EVL4ܵ)t֮* ⋏LJ26Mh4q쑱+Z)Fbo~ 3Qm[F2*WwT#ʣ'ddd}^pJLIR/٩ h6 pPHg ʱQ:,QwJlg%NJq z2v nst C( |&ϱPe0D YeoM'F7~#ð p_v5?oK?[AN]Z4X@Xa(/4$@NZ 34~1{P*bZq=v|*5spa0q M?5 f!fxRH {s"*p]j`nOf6Bd3_\%*Cj_N٩Kiͥ2e)k[_Sh|Lyi⎢?'8B)|'hTҝ=WyS°?veXφHw8 ,jմ3G孁uS]o2گFɋ t $N(D*Zetd2NUQ0 XSZ}zއۥ5{%`yԌD|Z_hjb qq #nHU|)η$">$5k$uucɑC|ݣqڀc? 'ۡԇwjgtBE$>(?җ(r<=T\l'tU [C}v^v=rMR;@(O88 쒊gf(6HN OWr)2L's8tj? 4}š;u ވb᠆5-âPǬ3>FZHu_<9)W˾VF\QK9i^[~H4DP؁(Eاz"2L: "#n$d/ U4*+Űs0^"V:W9PZWlsv{M@hF#+M+!G~# \v^61mv2ʢh$NPB)K/C_|@dv\[bC Zw ^6me a}NX8z*%L!0IY((iim j=5<~

h;bLnʝ 6g2p&eլ` ԝ5?]K7| ǀ}1rYZ7n)>ۭA^SYԥ[mBj$RsRSN"C/V2NMp`rwo$bSmEbei#kA_p졤ݒ\Oz+yi"%U_$Wl6|dfT2K Ƣ,gσ! CB6uKMbl~~m%? +#;2ZkzKx-F] ^]%)պvݡ;fr:u__R'D n`%DS((@NqF**$)e"WOtf\Qg|ohwlIjN!Z7{sˣY%oPUdf a8B!뽼 \.y_ I-R33]x)+@"P[ \cyYBl> m31|3#WҖNi]"ZќkaM]yV'b/$aZ:~-1CmrG1`)ẎhcC,`vTI`'Ϟ<_Cg(fceQXhtymvߺT 6\O* yjuynAN؉FƆV;N>CG>LÆBȏpt,ߗn#Еn y*wъ5Lb-vQ$lMaʓPG}~C (꩜^(j?ٝ,\J);eH.iݯl?m>'K崞7w=A nf7)Zf^!VS 5) d/h$^>~ɥgd R6tꨊgSLzRT#i+r&r14#$l]﮼Ŕrq{aR&} ]SOUݻ qc!7,pg}$iJe>D*#b8hU&@? eH=#!Uoᅧ&r>a(]|f4"D1bH~5WAyxј^B;tS"̪)9c._6U^Я2Lkki~_̆ +w(!7~97u``pQ&_D@ͽ;y0X| R[:ve"Ի[o?(Po 1XF2 u*Xe 2.]s:vFE>?;o=ܐMAy AJUTԫh-L1l9/nFk۾] 0$\4ͺJB(R@2-Yn1V^WTp6uN9p44¹8Q{@41DzK׎d9*'|8L`.7p ye 6%z[U 5Vi>6ScDY(֦JoF`7-9À7k@z//~thX|-E~Ԥ>`JLcY +fq 8p٬.6c❗}y0(5aiGӂ6}gmW٘Z+wX[>{fr}WSoX`1F/&| -뤨,DowP !2x"&_Ν )jxUM8zci13)o#LDD4P^ `6+@ҭ#FzG++Lِb8xr^&|Lnw>_±27 _m8{uލj@GCb`R6S %x{nL|bU,6~"ƀ#z UJPԏi~|fk^3?)aH5hW6F10˨Qޅ .(z4i%?HwlkCYQ@3½ƲtbvDЕ(7`K55PNgNu$;J`nFcI&1qQYfz#|`cRwU mKm` ) =Mo9NW@TP)KA[ V EO>m7ʹIҍ.60(i/h܆Ԥ[NQmAV}9$ ";OZo| p"!@uA7dHKЬg1,jU uO,W4L #˖xyʿmHe}3Q Ҋ4[HrrY'@ߏ-(gZ4 @ZDn"D1*ۀ)L ޲/'*.no)fvm Jٝ>U!{:(Sʋxmn sTMa5x1ybʤZl L4OF/t,< b>9e@VcUƩĴn/%)ڤލɏcs]qvG>+K)O0!Ħ1nHg l4RUN/2)3/p 2rZlAT^)zHs1I]iv$itQڴ/ Nxkȅ]ZQho@XI1%B(y &wUXB¥jì$?'hQT :+T5j(Publty)h9᷻ne777qmuo &+C#ۣq0סd6\3 ۯ )sdmi } lԥ9̞ )Ƌ޶u(Q@ǻؿۂ ZaRz5! U9(:"C8j-K+/P=[ey@Kz#DUƵ.cđzju{r7#AnC[98<60c:udR!/ kYʁl 'fM"h,e'ol6U .Ki0rljK9}y q/{dԜxST #, 1 XDx|scaIksr4S`فh. 6WY|mt`nF%b=1xy{Z 6t3L7j*TV d34LB0e<&Ǵ!طP"E3+U0B@ ڪOl(}*+PmOv؂lF %t~\t0mwh60m3!|`/%wh)LqH"ҕahϊBJQپQBT XQT_s}Enbܐ\8hw.[prNDr|`@2>58ZO[[%9ƻ <;ՃIzۜ*y׻!dξ CάY W(x&©K)JV2)gJhiyQPGzO4E]ɢ졬.:iUUnKM.@0"wdl,(a->pE.Jgnˣ$313`l5upS8PqDI}P8Z Dr'ly{Tt<,Nj8ޑDX<ap*~&~]BN - u0 vÉƛ'uS},Fs)OYN])-(lb8Ls4V~E,? yii:ex/ 'I8u_szejBGZAGWX.Y"۪Eta)W:eP*D6^s]!2"JbDbOs6Աک}YrQMy ?y{O5ثL5&~jKp32k jYʅAgdg"FI0,Ŋ`w\)pg-jJ|gP sEƻ4Zj'Q [hARN[_QWm/Jb4qmKwϖ]64Y=BR,"4* @_˯,;u1ϖמ;^8 t-ED¸^FG)A-N][< IBWlPOr(䠲i$_(G:&ܳ;uK|9XIABm3í꒓S'=Y5 Q*cJc#diOn|06j LHa,'?s"fUbݨ\Fu)TWQs6=? l;s1jJI? ~s>tR\PVs1)K%l\ EKS4VÂ^I en &OdUiF2.[a(i\LkcFQ9 DKˡqvi`juO;?P\4ݘ^Ww#w، YO)iҏ BT׫YlٚND|p^܉ JxoL%T-zޮ)̠0G[6 aalz_EУX @({}4Haw P`ӆzrU/#KQpϏܲrv 89-,Obn>7T"-#gl KӅ7>9_.ᖹ ,1QA1D W|h^N5 3VY hJkb"ϙb> JKdȸYbc/%KF}݃BH%v>yk,x9{So[Y`舩ߒ/w#{D ^Eģj13&z/幀@ށ.,Z-We=sQS=Rz pp1-Go_~ 1T_h<.) L )&6Mòc>; lGQKձM0%./˦;'SFQ"!)ISBh2R4sYIHHE8 ?Oʭ KvH.tKC֓bt.)_hա[J;" ~5)ь|\})Ԅ<n̖N[FooM sՄξi F^.s- ihTM{~{.%VqJam":6^4К|De[GP#!o炸e=C'4B qUO3# )Ar3k9 l'1abVMr'%$A֍'SwVl%'FSLgDI&PXCO)t]?AͤR,0f}H 2!JkL7J>x}R^=KAWdTm{Z'6ϹɈңn5O[ehpT)F0c4NjKܟWN=BAHu,ʛH0, ,8jΙa\̃ւ:WPkδ @\G\cq O;KxT cemxAB:­G{6~Ӡ GOArve'= JYD~k#J%B)x+GߺelߔyPYW1Q8uiȈ-?z %cc6@I7EfGc%Ԓn9l|ՊAm=avV_h=³~e)'+Rm2n 6>ѤNp ԼAq RѓʈAp||s/2OeמA:(e]9;gB7!0+ 5+A7+Q'5B- ǎBV+VPDͻGZ}_+idBfo7IF٤@- $4 %/R-R[0. 騿OMH_]P*K笍Q P C1~.=**'Lh1&JZq̞,NoTss8j%ln;I] 4vRBЊ#_:<ї7M!p[ <f .^f„A<v]Fo)DlG|zp]4O3.ÅVPXޣ%*0l @:9Vӧ+>ІIxڔM[&uuYRrD"0PƪeKV_!gNc o㋴g)\Lt &60+~룇&9篩U͹fC@͆O[f*z;n[l礴 jנ+=f)}G&&tab쾐kBeܨw_2rQeSOց *V&\j`lӔK_>d*:zY eC)6-Qura:q/56>:*fc-Aַ\vER#l=N!U[E 0KTX^k3(çm}d`cَgɛ~B¯@I݂c6%My9 Қ63<44dxvM{^E8Qν:oVf3=KË>3D7U tB'M!5D~:唯 hvʛ/,E˾ 9z4`yX4^[8r-8ǿy1^ÏB})K=*rsRjn hXD1 l't ""kbR  ) `N%`q\.fU>CwüLʌ{ Ttdm}% t"['E5暲 :eg1J< hq$#'D]Ǜ+T{79u&$3F7.jx.tP]ۗ/U-mDZ83Z|5XO7ʷz)`;<`*'o1B:HsBW+s/&wZ dRTBf1Ie }Lއ 6GߌϴCѲ_ɔ`K@ eB%s}YJSHorM6'BȸYڳxm%r7y NGs?tqFX\Q-q):a n$7ɣ ,?mB6-+wV/@5|l8]-}JFExiTn@%@,o0@}ŅAIہNe/ҖDK s6 \4aQ]L *  h$}@a ȝڸ^w';㈐C&%h :/S# &6&"i&+lXi|R+ H5%黉'jNYVuW^KR. S+*lyZm9Ve#s`%yS[SW|7ߑ♺]<ъׄS-R"R>乊#$-ʌ2gH-M֮G0 ղhzܞ: sQ$"9B PMh/K TIEsV9uF ~56|DT7\@l9m33P1VG #Չ=29V>5ߑ$VӶRNT`oCf08`*p+b&c/΄-mtG}$ǀUIoU"Yk-!ZaȕEH3Y!?XQm5`77>*5VV[=8띺N$6kEv7|XH8⠒T(4[غSG}%_{GDhq2ELn]Ѳ@G8#6 W1+*0ZQ'\ h<jFM!~o?_X)N]ip1J:s@lCe)xW͐5aeaPhf2ar'GrAΤTU\o Ǖ]%x0O~h7:UdF#C6$WT@<1f;{1avJ^4Z'Jj}u8(rک+M}uD+hgYA*س(C,2ʜr<$j`ٌ0:d_¼?bo]=6gѠ+KsjQ\O )[y\0XʷMCQYJ((U"@izJ6uOY)SQ(agL[ٚ D8C ^=6^ޕxTmeF{ۑ8z"4\L T~S^ANODB/'F,z:sJs@%JQ@kP"0o=䃺k61p$ͨ.*4Dp#&x`4 =3j_7)Ð<\lj18&{ru"f[/szY)fQ&bNiAE}&ʮ#'}k@ L,{|9R)U474,JI 5pBu /<:oE.4x< W-UD6.% XRKp1f"-'hg:'`rרp7Ym!ARGh7 ! ˤA,R J,’NA'TVq1[45PcLOͶ+~`}޺ۦFcq#@C*C+4k[->UMgNX#o9K)gV}b4{,s&pڟ{knSDP-vHZmɔ✓a4ʆhsCH榇Z֯䋞a/WCQEPu'FsQsNi)E{ g /Ü% İ[V bBy[rau ^t􉦸}_?%/X;C5i '.ۻYfRbȠPmOMx >Ct?`ÙCKF!3!z /MQhY< pAt%jȑdG%/|FfSrc9HYk  .YS7F>64Ҳ]s~p4w_XU€1H)-7ZuZ8'4|zIUܭ||4YS:@8B}Y>ؗE }p fVWr4d-"czm0Ear\M8 "%oϙz+[SW8#faNbo#MqҳV,hQ[rYY2@{={ԭ&\tUHYQ'1l9dŵgѹ]xbB2oNml$'gXBGeD4Iu=`A^SRcvw)8J_)Z𽬎znC5Q1jҭ^-ڇck%fv?<HeV4s}[;o`n~>9XAWg&^<5<glS^`>IZPӬ<[x]>PβQܜJ`ܱͩ%z BQe>y` ,{-3/1(oϖsWv`U HZ"4YV.[8UE,o8jS]KlcnֹNݗ.r FleYVaBڌdBDlCћ:[B_L] @aBn(V0TN\^*},Rdr~X;q8y8xkgA J)ğ?~#1H_$n.۝%K(l/ nʥ@[?Dd&g9<'hҪ] 1iީˁ N= 8q~}7BF6tm MYeyxtEIJԚ6 Kpx/x^,+ QCjma(6 y.g26ZF͔5o?`C(YDGwABۣ^TPc_fS/1 z]IFUOMfK!KZ- -L oAR+\eh9h|}^>*R2@0o%ztq+Rx=0hٹx.3LƊ0[6A+ v ZħsI*=[V~?agSMGD (scA;(ИI7^1</268 rAm!'t)LLqxj@]^Rt(QV_%cV`R(4ke%m91ًx\ԱAZU ezXouzհ(zxEoR F80 |B=aWB@S`e]]ȍ q`.x i \OL<ֳg=N"<~AI-9?A0*`(gf4~iroO L$wX H@+h#xl#hZY/RX 5 EY.|VC6gGDN0J.N;ohdu0neD?-@(fw؍@ Z}zK8ܯ]#Ib.^m!&JB1)mӶ e-)kMBW QWP ퟝZN>>n,=3/}xxF~,2BJ=֩i'{v{UqH^?I4 i Qlqyl!}7*]ZwN2*lJ0GVNrs;u`:Rf%!fCYu0lʱ* +dč䱼%;X)Y"|2m/8%fUEꏾɇ'xF6(Nm2;UůhA TAy{󇫇khRЉ ("kNzQ\g=Ey/vT=Q^تdtFs Ѭ8HʆH'h5m[&cGa4T(R@h 3bH! F ky*8Tՙ-`LYEtLtX ZnЉZ>}1}ZjO SH.]h):/k0j{~[RV5dʹEf}rGjOkm0ͻ>dq #SM#2j=zSm\# #vx2 v*'lp&ֶ^ |3V\4䭥q-*VmؐMzwg'1YCTIʰ4 DhGtVO6*ne2\7OPEY&tq|8"KXޢs)lٕ;ޭ'Sd8&D; {o94`Ԝϐًs^ڏ+jHqbc띺UQzsKK2GHG:p[he"x.H&׸~;?9"YѷU,;+«QVPS#m j]RUl"' lQvom OVکK-hU!#pp$]@l-e_:YPP'i';P,PezQ$ײb|1oḆRi<@HBYCƸ8bm^G(&.VUq,u-nyAܽtTO{.4PբA88Zt!Tr)tS>%H1n', )]g}9AVt6k|bZ"$1u xrp5SPe2\%B\Tp{)1V9H ]PBZz ]I%hb.ȚL vph(tx}&| =1y,| FR?_| j/HOl+cxI#ގT렇qWFU}aYb%T6 IBo~[C 6nawE]Z! S1_+\do/ͥBF,9I{ĨC]Z[ BeӑN4\mtE؃T=p'jXDb6e Y8k i F1pXl=nS7G8wz/"‡xD53CA.U>Y=hq8o. ?'g~76k9Pؐ)~ĖpANWrv ,{]7{fM^uݳSV;uۄ ($YKȄhx#5:p4oۮkغq`ʭU~Glʀs Q_ W,ZH 6.P*&ѴX=dzU*z=;z[RsӀFLo]ѐ Y(TJMTlF)h'X"tB*s,q \zP/ɗH",Y1WvO-6Ui6U5`_:P U+%twٳj׽Ok;$u_,"e( %)*Z)6j0k+dp[R IX3m:n\Ԑvt }5hOj<aќH \4Pt (r eJɫ4Cb~7, oN9*㧐_ Pȴ\ DЫaxQy^C@uVf H4Dr8ODq\:I =6`83e0B1j$¡~BcZ2P5-[Qn߾zԅqOql$ ac2Ÿdv`f9#X  FT=k :J=LPlݠ/! F\1A %Nd*ZH֎2W}&^o|Lz>/X~gR̼豶(*}ޯa)VWunL\Ek()+OY͛Iιb5>3FC] xQG)ݚa2d[T_)v|j FTj:U6~؈`ݺ猚-i_AKRFLH>yB` n;jHA.(ͫ Rd,ԃlشsޓA}8ݙ:){J@5dCJyTVϪ֎J`Oyrn2խn6۽"Na qd I@5m`q_]G! ugi u2lX<ɛrGVn3WiHu.PI-C\'w,!.:g!VVZPKyjFc;~%Ʌjy+Tu^EfVӇ?W|F-($Y[JB "4f$t9V1/4)i'TX:Uȳ:e'4KCY7vZܬqT:l6; LȐqCZ3DF J&k1lk˴2olt`TϯکA"𔫥O( *jmЂȼ::i#.0!h 0*kݛ |Im-, 5aOGO h1,;8ẗ.qIVWӬ=)ī7&xtY,\mF1xIS U1s1.Z\hP9պ›Ҽ&M#@WYdU'`T^O+;鄸ź>^pVdt7P^È:%& [6te ˒3FkZuRZAø7ǫk2RGfb1L{/ BoےAg%؋1WnŃزqc"{3]g!TȻڅl=T"Im^>/o\!EL5WO3q҃m^lV 0anHG<ű”2Z%/:& y:U4VZ1UG*u#J{GTl׃J*?_tS0 D:H5&5 R ,vDۊf0Y)IKQgȭ[`DzG91<Ԭ% vw<f Keّrv$ BC(Eϝڐ:=POŅ'e٤5fNyv\&A*UX(,Z곱 (r$yre-Յf>#t[G4g'n srQP"2;zI˼ ͝ J@ON2 . rh,*Q=LX[{O-Y"(K;wQͣR.0UsH>0:94RQS.]Lj J Ss*ȉЎ,'-om=i85zV꣦ce^vڼS7䁡j rd[IŢ tA!>2_gT*aS)\;"r[AOΌlsM2L[16Qd4KV=qqU`3ĸ05>V[N[S[ͷݾl"׊k2qh-G\G9Aߕ&KWl[ZXf#VI!a] .i..YOA_Su*.:X"-YBA{1`(T#MaR21#;{a>J~Դ6}͈m:Ίي*ܘBh?Dz>rR|e:)*u*$VzBpARsK֠I܆oC)| :e|u/kNz8]:][ ك˵Q;TFsT n3ќ2re$u[os ,ĆK[T Mi z$?vU/;'`BHv?v!6sQjSbHc얒ndtu*ͼ?|+B5aF$v g}dmcQL`n*Egrn\֖ʣ$C F6uTz}elM Q:Y.!s)(rYYEv L!+"a:^ ˕R0 a,;1f#LC&i-$huË)~t84걯 9Hsz%ҡ*a AnH\Bo%f^O:l9cx@QP8L _0x49JhUśO"o/^F۸PC=Q|5|93ԛYrc68bkVL]B-?1L9mrjy,̤dRK]H6)%s0!JOϜNIi*),z=L0% OAyu$N;uG/?||>~w>P%U[+Y4nqljhgU'tP񥷮^ )Y+78$>OrTXµeVȾ-yk?k3aj֏g,ϟ=?o:X/UΣ[hm,š|uO哫 A' >RqI$P?O갪uG ~qO!ˑ=g|yQȭz6<]7gXԲ3^fUHWM䧯#9אuYYҘ(YYp ُxOO}_C7#-EV;k9Ua㵧mͳ᭸ZrYB5z~wI[`s痷::0˃},I x5 7Ff }z_oƺ6EZJےޞX2[wqsZ U9Q$-=zϖ$xFξ7ngDqvwIX7XA,/MH7cg KLcQ_oSʊ鴖>#qim8RLG%m*W-Az2#usƧwwl}ZC#m)F xSCIW}`];3Mf$wā lQoq{Ł߫h&ذ2'yxuUٜuA)"#807MjP>le<].ALKݱnMr(61gYtc~JVƷc|w5p;@)-)k"u0]<& ǟPꐶV{s tVkJwIߕ׀C69=zJo4j3R=0!+f-% 7`{5A</rFvWflOZn&f{ж+4@yF.خg3#kZS]p i iF Z'^?; B#Ff!mGmÐF‘Z=;橜MظuyމJ}l= Hڕԝ|wHs\U;!wugZt8JkiN!IMSp7U m.JRJar&#f'Џ=YzжˍvWzUW)Uh }Oof6Nˆ@%qGfmfH飠㷛ֶ͓A/"JCbTbof{ж9kHmR[~[ѼZw&<n͏&V YrrUS' ΄ܬÿ`pB-=KwI7cq+_HpOf͓t6c=룖Dk5ܤ)nEskn!Lxj5 Y; 3%) [O/J/1EB$› 6>Ũ~qzݨ  bwJ`7Y=enmM4)UR |lmLCIk¦ݒ;?-}tU~tLP_%}1`l{@=@v7w [`ťx'p BĬ想~UHS^iބl: WƔl #!N\3n -m ;:2D?1NIЛeTk;&w~n47iЩ&e0g+m85SlxlW`fb^X'9_7j%f]wcl[#h [{+K盹9ǔKjӡ.PIf2XK[A(s˛Ev3{:1V,b5#^<D}3]̶޳MO6kj~cIq7Ρo'^8+އ4h}2lr[D sXۑMjh:F^\hvcB $%FҶ?yfFReb7ЙUi ttXRB$6ӱMP.=%<;w[?Qy8\?>S^YĜzwK@]U3YY8A?3ۼΧ5Ryۏ"݈.Wq0+l/>`ۛڍL )xӼ'Jiߏνvo۽;l]6>~R**d?U5= P1~>z 6v;n|orwgO0g }w;j?J?+pɝ/|FuTc [ƾ$Ŝј r!YsSBMœ.qݏ]hm''_4B _ zO&og{m_JQޝs8C䇻`*3X!;'fw&LE 5w6ڛa;޽wS5}|Tǡt^`DS=l4-o3E6$?_#o+{!ը!~^$¤{(p:b ^Ν2R",#}u HfQpmϙj;R@,z= >!E>Dsq$]^:gh3Fk4))ryHYBB[A&ɽ po'y?uE~2j1y֘Q!P:4tT+fwmOԻ"ht{-JyX>ŷc®Pd?^FZ#Upj^h*ie0B(rJ6x(mx+ E\g\AFFW\Є 5*O*$ܹڍ=/QTg3fg,,lਮ+Lv@m9c~Z gн&޿;(E:_\Eg~3a~~4wMϸ0ѡ0%um] v5SGFu$]!q!AZ/@6 Xɺ_WQ*n4قvLV-%?I=A FA h|iRZp\Q'V;h@{1۽I $ж;$͚0TςVsGFu5-ullmk':ѱ:&v4=""ݞ l;+eЛ(ap4rʯ:#ĩ#*zihuGZgg3Ց3bgʸ2O)G8_/"!/,(sxTo lg/bQ^)Q{j%Sb>NxW6h-߹+`,L<1Lvbf ]uC@Jә Zy9A -݈KqgȘ`3m3\C}[^0VNsBMs::SvQfˋg@&ˣ=M%,}1u f,˘)H&Xqmֺ)0b+ j(3. W 36 C )ݖhJnϊ?hkBە7;ƞ`*k;WYi]$&xB ĭ6Fȁ>==8sK vv&l)Í=aR9k1f L\wdTolkBv^sR4a8[CYH}gmFdp̓.EѭQ2bhT(tÍ;02/\f*gЎ-fz؇'{BFȦl.GaW=(_(T)WaUܴύn Ae5(0.*tΞfiLq,W%wqńx+1dm4M7@?'0ب^ڮFԹΫyPfNh\-7h`*[f) H1y/k$u7ӽK^C%;bjvs1y0e]6:Ø +E-W=cם\Vu˜iq;;&EN#*!8<6?m=h.g'FkXg佔h|'n Yg8+;F³){ؾ-lF#ann{teHbVTI]͵ό+F 06x?ڽsᔦyH&KkTm'0[Dn/&<[4[}Ӌ=bCvLk5L(k ;әҩ2?ZoӅ L7 ?y']bt9>n0Oj%q$%+t'"Otз,Q6;v$CBrlsYώm{)ĸ~0ZN͔Z^:#*>i^[P.3=NO,ob6lǮ֙azI ?=ѽ,\aTm'-鍏gB:ϯ6DZMa h} bsgg~qS9wffEK67' k`C~Gjܺu)5 jT!l#6-^\coW5uxӯOx{q{M ߛBa \l9To?zp_X|7]?ESZ)Kl<ޞndηtwoO7`{{~[;'=Y-݀흇 ޞnC loO|K?,"ZzIENDB`DyK Anthony-Val.Flynn@cec.eu.intyK Hmailto:Anthony-Val.Flynn@cec.eu.int'DyK )www.europa.eu.int/comm/echo/index_en.htmyK `http://www.europa.eu.int/comm/echo/index_en.htm{DyK  _Toc88728270{DyK  _Toc88728270{DyK  _Toc88728271{DyK  _Toc88728271{DyK  _Toc88728272{DyK  _Toc88728272{DyK  _Toc88728273{DyK  _Toc88728273{DyK  _Toc88728274{DyK  _Toc88728274{DyK  _Toc88728275{DyK  _Toc88728275{DyK  _Toc88728276{DyK  _Toc88728276{DyK  _Toc88728277{DyK  _Toc88728277{DyK  _Toc88728278{DyK  _Toc88728278{DyK  _Toc88728279{DyK  _Toc88728279{DyK  _Toc88728280{DyK  _Toc88728280{DyK  _Toc88728281{DyK  _Toc88728281{DyK  _Toc88728282{DyK  _Toc88728282{DyK  _Toc88728283{DyK  _Toc88728283{DyK  _Toc88728284{DyK  _Toc88728284{DyK  _Toc88728285{DyK  _Toc88728285{DyK  _Toc88728286{DyK  _Toc88728286{DyK  _Toc88728287{DyK  _Toc88728287{DyK  _Toc88728288{DyK  _Toc88728288{DyK  _Toc88728289{DyK  _Toc88728289{DyK  _Toc88728290{DyK  _Toc88728290{DyK  _Toc88728291{DyK  _Toc88728291{DyK  _Toc88728292{DyK  _Toc88728292{DyK  _Toc88728293{DyK  _Toc88728293{DyK  _Toc88728294{DyK  _Toc88728294{DyK  _Toc88728295{DyK  _Toc88728295{DyK  _Toc88728296{DyK  _Toc88728296{DyK  _Toc88728297{DyK  _Toc88728297{DyK  _Toc88728298{DyK  _Toc88728298{DyK  _Toc88728299{DyK  _Toc88728299{DyK  _Toc88728300{DyK  _Toc88728300{DyK  _Toc88728301{DyK  _Toc88728301{DyK  _Toc88728302{DyK  _Toc88728302{DyK  _Toc88728303{DyK  _Toc88728303{DyK  _Toc88728304{DyK  _Toc88728304{DyK  _Toc88728305{DyK  _Toc88728305{DyK  _Toc88728306{DyK  _Toc88728306{DyK  _Toc88728307{DyK  _Toc88728307{DyK  _Toc88728308{DyK  _Toc88728308{DyK  _Toc88728309{DyK  _Toc88728309{DyK  _Toc88728310{DyK  _Toc88728310{DyK  _Toc88728311{DyK  _Toc88728311{DyK  _Toc88728312{DyK  _Toc88728312{DyK  _Toc88728313{DyK  _Toc88728313{DyK  _Toc88728314{DyK  _Toc88728314{DyK  _Toc88728315{DyK  _Toc88728315{DyK  _Toc88728316{DyK  _Toc88728316{DyK  _Toc88728317{DyK  _Toc88728317{DyK  _Toc88728318{DyK  _Toc88728318{DyK  _Toc88728319{DyK  _Toc88728319{DyK  _Toc88728320{DyK  _Toc88728320{DyK  _Toc88728321{DyK  _Toc88728321{DyK  _Toc88728322{DyK  _Toc88728322{DyK  _Toc88728323{DyK  _Toc88728323{DyK  _Toc88728324{DyK  _Toc88728324{DyK  _Toc88728325{DyK  _Toc88728325{DyK  _Toc88728326{DyK  _Toc88728326{DyK  _Toc88728327{DyK  _Toc88728327{DyK  _Toc88728328{DyK  _Toc88728328{DyK  _Toc88728329{DyK  _Toc88728329{DyK  _Toc88728330{DyK  _Toc88728330{DyK  _Toc88728331{DyK  _Toc88728331{DyK  _Toc88728332{DyK  _Toc88728332{DyK  _Toc88728333{DyK  _Toc88728333{DyK  _Toc88728334{DyK  _Toc88728334{DyK  _Toc88728335{DyK  _Toc88728335{DyK  _Toc88728336{DyK  _Toc88728336{DyK  _Toc88728337{DyK  _Toc88728337{DyK  _Toc88728338{DyK  _Toc88728338{DyK  _Toc88728339{DyK  _Toc88728339{DyK  _Toc88728340{DyK  _Toc88728340{DyK  _Toc88728341{DyK  _Toc88728341{DyK  _Toc88728342{DyK  _Toc88728342{DyK  _Toc88728343{DyK  _Toc88728343{DyK  _Toc88728344{DyK  _Toc88728344{DyK  _Toc88728345{DyK  _Toc88728345{DyK  _Toc88728346{DyK  _Toc88728346{DyK  _Toc88728347{DyK  _Toc88728347{DyK  _Toc88728348{DyK  _Toc88728348{DyK  _Toc88728349{DyK  _Toc88728349{DyK  _Toc88728350{DyK  _Toc88728350{DyK  _Toc88728351{DyK  _Toc88728351{DyK  _Toc88728352{DyK  _Toc88728352{DyK  _Toc88728353{DyK  _Toc88728353{DyK  _Toc88728354{DyK  _Toc88728354{DyK  _Toc88728355{DyK  _Toc88728355{DyK  _Toc88728356{DyK  _Toc88728356{DyK  _Toc88728357{DyK  _Toc88728357{DyK  _Toc88728358{DyK  _Toc88728358{DyK  _Toc88728359{DyK  _Toc88728359{DyK  _Toc88728360{DyK  _Toc88728360{DyK  _Toc88728361{DyK  _Toc88728361{DyK  _Toc88728362{DyK  _Toc88728362{DyK  _Toc88728363{DyK  _Toc88728363{DyK  _Toc88728364{DyK  _Toc88728364{DyK  _Toc88728365{DyK  _Toc88728365{DyK  _Toc88728366{DyK  _Toc88728366{DyK  _Toc88728367{DyK  _Toc88728367{DyK  _Toc88728368{DyK  _Toc88728368{DyK  _Toc88728369{DyK  _Toc88728369{DyK  _Toc88728370{DyK  _Toc88728370{DyK  _Toc88728371{DyK  _Toc88728371{DyK  _Toc88728372{DyK  _Toc88728372{DyK  _Toc88728373{DyK  _Toc88728373{DyK  _Toc88728374{DyK  _Toc88728374{DyK  _Toc88728375{DyK  _Toc88728375{DyK  _Toc88728376{DyK  _Toc88728376{DyK  _Toc88728377{DyK  _Toc88728377{DyK  _Toc88728378{DyK  _Toc88728378{DyK  _Toc88728379{DyK  _Toc88728379{DyK  _Toc88728380{DyK  _Toc88728380{DyK  _Toc88728381{DyK  _Toc88728381{DyK  _Toc88728382{DyK  _Toc88728382{DyK  _Toc88728383{DyK  _Toc88728383{DyK  _Toc88728384{DyK  _Toc88728384{DyK  _Toc88728385{DyK  _Toc88728385{DyK  _Toc88728386{DyK  _Toc88728386{DyK  _Toc88728387{DyK  _Toc88728387{DyK  _Toc88728388{DyK  _Toc88728388{DyK  _Toc88728389{DyK  _Toc88728389{DyK  _Toc88728390{DyK  _Toc88728390{DyK  _Toc88728391{DyK  _Toc88728391{DyK  _Toc88728392{DyK  _Toc88728392{DyK  _Toc88728393{DyK  _Toc88728393{DyK  _Toc88728394{DyK  _Toc88728394{DyK  _Toc88728395{DyK  _Toc88728395{DyK  _Toc88728396{DyK  _Toc88728396{DyK  _Toc88728397{DyK  _Toc88728397{DyK  _Toc88728398{DyK  _Toc88728398{DyK  _Toc88728399{DyK  _Toc88728399{DyK  _Toc88728400{DyK  _Toc88728400{DyK  _Toc88728401{DyK  _Toc88728401{DyK  _Toc88728402{DyK  _Toc88728402{DyK  _Toc88728403{DyK  _Toc88728403{DyK  _Toc88728404{DyK  _Toc88728404{DyK  _Toc88728405{DyK  _Toc88728405{DyK  _Toc88728406{DyK  _Toc88728406{DyK  _Toc88728407{DyK  _Toc88728407{DyK  _Toc88728408{DyK  _Toc88728408{DyK  _Toc88728409{DyK  _Toc88728409{DyK  _Toc88728410{DyK  _Toc88728410{DyK  _Toc88728411{DyK  _Toc88728411{DyK  _Toc88728412{DyK  _Toc88728412{DyK  _Toc88728413{DyK  _Toc88728413{DyK  _Toc88728414{DyK  _Toc88728414{DyK  _Toc88728415{DyK  _Toc88728415{DyK  _Toc88728416{DyK  _Toc88728416{DyK  _Toc88728417{DyK  _Toc88728417{DyK  _Toc88728418{DyK  _Toc88728418{DyK  _Toc88728419{DyK  _Toc88728419{DyK  _Toc88728420{DyK  _Toc88728420{DyK  _Toc88728421{DyK  _Toc88728421{DyK  _Toc88728422{DyK  _Toc88728422{DyK  _Toc88728423{DyK  _Toc88728423{DyK  _Toc88728424{DyK  _Toc88728424{DyK  _Toc88728425{DyK  _Toc88728425{DyK  _Toc88728426{DyK  _Toc88728426{DyK  _Toc88728427{DyK  _Toc88728427{DyK  _Toc88728428{DyK  _Toc88728428{DyK  _Toc88728429{DyK  _Toc88728429{DyK  _Toc88728430{DyK  _Toc88728430{DyK  _Toc88728431{DyK  _Toc88728431{DyK  _Toc88728432{DyK  _Toc88728432{DyK  _Toc88728433{DyK  _Toc88728433{DyK  _Toc88728434{DyK  _Toc88728434{DyK  _Toc88728435{DyK  _Toc88728435{DyK  _Toc88728436{DyK  _Toc88728436{DyK  _Toc88728437{DyK  _Toc88728437{DyK  _Toc88728438{DyK  _Toc88728438{DyK  _Toc88728439{DyK  _Toc88728439{DyK  _Toc88728440{DyK  _Toc88728440{DyK  _Toc88728441{DyK  _Toc88728441{DyK  _Toc88728442{DyK  _Toc88728442{DyK  _Toc88728443{DyK  _Toc88728443{DyK  _Toc88728444{DyK  _Toc88728444{DyK  _Toc88728445{DyK  _Toc88728445{DyK  _Toc88728446{DyK  _Toc88728446{DyK  _Toc88728447{DyK  _Toc88728447{DyK  _Toc88728448{DyK  _Toc88728448{DyK  _Toc88728449{DyK  _Toc88728449{DyK  _Toc88728450{DyK  _Toc88728450{DyK  _Toc88728451{DyK  _Toc88728451{DyK  _Toc88728452{DyK  _Toc88728452{DyK  _Toc88728453{DyK  _Toc88728453{DyK  _Toc88728454{DyK  _Toc88728454{DyK  _Toc88728455{DyK  _Toc88728455{DyK  _Toc88728456{DyK  _Toc88728456{DyK  _Toc88728457{DyK  _Toc88728457{DyK  _Toc88728458{DyK  _Toc88728458{DyK  _Toc88728459{DyK  _Toc88728459{DyK  _Toc88728460{DyK  _Toc88728460{DyK  _Toc88728461{DyK  _Toc88728461{DyK  _Toc88728462{DyK  _Toc88728462{DyK  _Toc88728463{DyK  _Toc88728463{DyK  _Toc88728464{DyK  _Toc88728464{DyK  _Toc88728465{DyK  _Toc88728465{DyK  _Toc88728466{DyK  _Toc88728466{DyK  _Toc88728467{DyK  _Toc88728467{DyK  _Toc88728468{DyK  _Toc88728468{DyK  _Toc88728469{DyK  _Toc88728469{DyK  _Toc88728470{DyK  _Toc88728470{DyK  _Toc88728471{DyK  _Toc88728471{DyK  _Toc88728472{DyK  _Toc88728472{DyK  _Toc88728473{DyK  _Toc88728473{DyK  _Toc88728474{DyK  _Toc88728474{DyK  _Toc88728475{DyK  _Toc88728475{DyK  _Toc88728476{DyK  _Toc88728476{DyK  _Toc88728477{DyK  _Toc88728477{DyK  _Toc88728478{DyK  _Toc88728478{DyK  _Toc88728479{DyK  _Toc88728479{DyK  _Toc88728480{DyK  _Toc88728480{DyK  _Toc88728481{DyK  _Toc88728481{DyK  _Toc88728482{DyK  _Toc88728482DyK www.bioforce.asso.fryK :http://www.bioforce.asso.fr/DyK www.interaction.orgyK 8http://www.interaction.org/DyK www.peopleinaid.orgyK 8http://www.peopleinaid.org/DyK  www.redr.orgyK *http://www.redr.org/]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4]$$If!vh5_52 #v_#v2 :V l5_52 4DyK www.evaluationpartnership.comyK Lhttp://www.evaluationpartnership.com/DyK echo-eval@cec.eu.intyK 8mailto:echo-eval@cec.eu.int'DyK )www.europa.eu.int/comm/echo/index_en.htmyK `http://www.europa.eu.int/comm/echo/index_en.htmDyK Anthony-Val.Flynn@cec.eu.intyK Hmailto:Anthony-Val.Flynn@cec.eu.int'DyK )www.europa.eu.int/comm/echo/index_en.htmyK `http://www.europa.eu.int/comm/echo/index_en.htmDyK www.mango.org.ukyK 2http://www.mango.org.uk/DyK www.who.int/ithyK .http://www.who.int/ithDyK www.fitfortravel.nhs.ukyK @http://www.fitfortravel.nhs.uk/DyK www.icrc.org/eng/ihlyK 8http://www.icrc.org/eng/ihlDyK \http://portal.unesco.org/culture/en/ev.php-URL_ID=8450&URL_DO=DO_TOPIC&URL_SECTION=201.htmlyK http://portal.unesco.org/culture/en/ev.php-URL_ID=8450&URL_DO=DO_TOPIC&URL_SECTION=201.html-DyK .http://www.unog.ch/disarm/distreat/bac_72.htmyK \http://www.unog.ch/disarm/distreat/bac_72.htm5DyK 0http://www.un.org/millennium/law/xxvi-18-19.htmyK `http://www.un.org/millennium/law/xxvi-18-19.htm5DyK 0http://disarmament.un.org:8080/TreatyStatus.nsfyK `http://disarmament.un.org:8080/TreatyStatus.nsf+DyK *www.un.org/Depts/mine/UNDocs/ban_trty.htmyK bhttp://www.un.org/Depts/mine/UNDocs/ban_trty.htm7DyK -www.unhchr.ch/html/menu2/6/protocolchild.htmyK hhttp://www.unhchr.ch/html/menu2/6/protocolchild.htmDyK  www.icrc.orgyK *http://www.icrc.org/DyK  www.icrc.orgyK *http://www.icrc.org/DyK www.unhchr.chyK ,http://www.unhchr.ch/DyK  www.hrw.orgyK (http://www.hrw.org/DyK www.amnesty.orgyK 0http://www.amnesty.org/DyK www.bayefsky.comyK 2http://www.bayefsky.com/$$If!vh55 #v#v :V l4055 4f4$$If!vh55 #v#v :V l4055 4f4$$If!vh55 #v#v :V l4055 4f4$$If!vh55 #v#v :V l4055 4f4$$If!vh55 #v#v :V l4055 4f4$$If!vh55 #v#v :V l4055 4f4$$If!vh55 #v#v :V l4055 4f4$$If!vh55 #v#v :V l4055 4f4$$If!vh55 #v#v :V l4055 4f4$$If!vh55 #v#v :V l4055 4f4$$If!vh55 #v#v :V l4055 4f4$$If!vh55 #v#v :V l4055 4f4$$If!vh55 #v#v :V l4055 4f4$$If!vh55 #v#v :V l4055 4f4$$If!vh55 #v#v :V l4055 4f4$$If!vh55 #v#v :V l4055 4f4DyK www.peopleinaid.orgyK 8http://www.peopleinaid.org/DyK www.reliefweb.intyK 4http://www.reliefweb.int/DyK www.irinnews.orgyK 2http://www.irinnews.org/DyK www.humanitarianinfo.orgyK Bhttp://www.humanitarianinfo.org/DyK www.crisisweb.orgyK 4http://www.crisisweb.org/DyK www.alertnet.orgyK 2http://www.alertnet.org/DyK www.mango.org.ukyK 2http://www.mango.org.uk/DyK www.odihpn.orgyK .http://www.odihpn.org/DyK www.plymbridge.comyK 6http://www.plymbridge.com/DyK  www.icrc.orgyK *http://www.icrc.org/DyK www.plutobooks.comyK 6http://www.plutobooks.com/$$If<!vh5x55#vx#v#v:V l05x554a<$$If<!vh5x55#vx#v#v:V l05x554a<$$If<!vh5x55#vx#v#v:V l05x554a<$$If<!vh5x55#vx#v#v:V l05x554a<$$If<!vh5x55#vx#v#v:V l05x554a<$$If<!vh5x55#vx#v#v:V l05x554a<$$If<!vh5x55#vx#v#v:V l05x554a<DdT$Nb  C >A&Provisionallogo_ENb}-  hqn<n}-  hqnwnfC8'v-Gvt>xU^ϡkȬS=d`Jڀlhrş^g"j|䯁kM_kSRf hƘs#IWCTa\Œޢ6.m/1FkR8%,# ڟfAӏ̆I4`$UL:B ՙMI8 :N<\;POYWJd6*{ul9eCl礇-·_IJ/eN{~p?ĿCI_q70a+Ԟ]+t~U#yHWe6jʨ3  7zjq|pcȳl R,~l1ןFYx_0CnB4}[u:WxOq>~:s=}ˎd>}OpRy^|GӲԸ==Ip?uӢ-MFi,cZ\m-HRwsene,'aZ$,}voIEq{thwyT{6Ƀן.qkm;'}%y"Za ^"4Aoȕp?G' _gFDVF,Xv{;vƍv~%a`z/*ÏʁmfyC*q0j< XD]Z;j(#ן޶׸Ki޽+amS.-!,BR_FѤp1 721gz>%A)~ ğA+q_\t :U8љW|?wՇ?J'_GpȎ]v{[?R#Y(&[za&$s'UDR }~ l)Otl Q" f[lsP#m֟XO {L}<**m-c#f;Խ-qi='9 3DQ!G]kFm8[#l~n>@?1fnTK5Fӣ ܩjM\nc-Χ#*xEjK p`Cۑp3*xƼѼi4b DU1M̍XFT{v01x-ol>xas3+ S~7Oo}-.?`l~g8nRK~3@v h&El^H[ >{'f['[1o(wl/yR2B 8}si JkXVxz1m3Gjz]u& *\Қcitmpp-/f-]1de;[cUQ+վ#fsǮW̶{[B?RnfK^ԡp׫ɏ>tUW wl@ne-}ǪQ,.!omKW}ARǻi}h;Rhy͓6L[ۭ٤m;1s=^j;?v}lN67"mK_N V=+|_+F\<!mվ\s6z'jܘnre1ۿ4n,W!)=Ub4R1 ;!g|eFG:yr ±G/>ܠeTֶ6e+A\%s5 y1oޛ=ٖ/{8I2!WhV&=y\}7c~g̶=#.hq΅aJ_ԓڮȐ ?cjnJ{΄'?xŋߞ? 'Aƿ ;}osiu\k77b6*fcG̶1 ps{g Yxovר}Txwb6Ƥ8umk>b@7ZZ>4.xhLY5WNTsDE#e?[tafCIݍ >YERa+־9=~ǡ%55*w=%1ޢIj#ǯ7ݷh,'>M;> {ӫ=ţ IaޔH+?p$--쥾D'<6Oe̞Z\2a6uVrL{vqsj#H}{E ʼ_:P[k`Gޗ=tT՚yrNW#9 sx Ӂ聵S_1<~+VqY|-:̶>?n(T,z We0!+7X6`ێm`#Q_ij>jbSeVrwSh6X>Ɲ_f\l1r˨L|'vM0̱Q>TGaocwݤx(Egn/MsTml=È,R"9ulz|ɽ2g Dj==^}qL3k!nDTh<'&>&npȇb~]L> @CY!Zl]Qƻѽ-svUgvCK_WkSk= LOV+jHo$w^o gx$/q׫nsZs{T[Wbz wqIzh=:Ϻ`[@5U퐼'5]שJ}BWuz_::r.f+K4t麌9;hoJ`7 ʹgJ6_+J`~ʆ.&O?).7@1^gu:/ ֛.>f 9; Xz9 !\L}rw׉z6ZUHuj|km6ôsv7`߅ٗԝnKߠ $u{drׁ;]CٍqwJlivQžhNb6܈+ӅNfՠe^OO抿6-Ìb;u،Y; ^%V>ܔH`l6 jܝ!;}8p G_'M7^6$51։TgϗVy2SQ_&GL|9BZa\&_QM}8sńJ?EWDmOR&_zGzaJnS[;qpS[8-ٳ~{5^YnW gn4v%6>Yn~Ls ~]|٧֤4Uv|ַ+^v,9EJO`5=us.ďŷ|gw N/O{vM6K*fE "J.f{iK`lx\GEUw2߳$18ӊS DqkMoO`;Ә[ra\?Y7)ݷ?GK;noUWbuð 'ˣ&x?Z/vO:-9t*Ee5]hhΘcg @ˣP.H;yŸo+74zz|g&=\;қ僷?IKHΎiE.vcbD >PYōmucHc hi9("G>4=孛?Q @N}o-,ڜ@ȩhudP˗oKJTc9+5SaNǒ$G[jzhx?P~8M[%G<'{v8q~+x_QO[GmÑuBɌ$霛>NF4>~|y:}i^7a4GXQP9v釗W*r@?ns6Mh_<_eB59N>=kC[ "x{.әoꜭR!Okv3-vPG=8pv/oE/w͇?4^^l>[x&4+Yk;i×d7pۭ[qßUqgg?U.q9vTbx[/$tV'ޚaӁƯ$|@pgWӚLq fWv%ẵ[>|1Zzӗ ~O2KcLwsO$[YѮl:SO i9S ~zb'D<<3HK\'fkBpUњ20oI ,YS1%қ#-2& Ncn,VnN+`,lt87G0uuDeشKk,Nq8KP&W%l 0MVr\>B7G$4B7ۋ@TNp&sա3cI+=fniiXK Dy8+ZAwb3 ,ߨpdͩs-7G_)i"^Е.k#[׹xU<@k9F/ϳlwu8N0d6͑/+-.Ы *' y"5gNN{=qpI]2ib ы ‰+VZf#cb?^CѨ=hOc苈^EgKcʽ=UgjÀ3Li>DКD"Rk6 H]x,E-Ny7_5f#K(]s#'E#;Ńsfvڹ,+% ^\`rLGG Yme"%в+y]cO ^ݍn\4ikN"[lOy.iO~.u={ob6S$tV|& "術k VQ5#j#Qqx9 B@hn_eݓ-_z1M;z{z Cy^>!bͤȳ qIoEN;{6*෫b{yҍ|}gJv&`eŴST.& :Xax76 [%G/qqXm^)?Nҍ]qvwøy> o[N]NFkSYKBh4k,)ؚw(>(n|#`K?:z tAHYKol$7-:ۇx\Ibm~l|6x9z>ꨊ~WP @: e0mG/`K'^/a>v 9Un`!OG*\I`kݷR7ʧaܵ5zG#[})ߘ2IUu !I@H⮼t -'2~^F]AGgPt~N>$iYۦjWEjHpOjؽnt`=  F6LX d -`E dB{g/; Zݠo?P\~^e ݓF7C'M /pmf.!` %-(_-h3wƹ UʼnjgG=W ֫1 3#AŬO/jW[WUujn>c7.NLc?d _{ qu6z"}A(^GI`lL/k.L =yi117n4 ~YGYd5IEQmX..reZbQч<<46q< & %nS&?Dc/~q4%PE}}Ri0 3W/,͉[0!xi6&V,Vۡom4@ -?>$9Ox$XԒiu, (-ZiRa\C2ʂg5U0YíË&>9-fD>6:RƅYY+%Ù;"+I@C'1fFdZMxx1>^r&gR=`!8&pI4_+GR. O7pC޾R\QwԹZ$ąϔrNOdE?L0"M#G@r$e7u4:I0X n)^i+ֿAVBKg΀مc}aZlH5%9mJD(Ds-?.W%~XjFw5{EGQ Tdv^ci K8y!Jqn[՘ QD$ h?b\`)XjNbbh y'ѼL@VBӌnKrT55OZ2; l6~j|`y9ܚ3TMxʊeY$d.< M ׂ!Rr6᪠>ޚ"A 2uw50Srpď!C'b] \cYȧ, %RP"ZN*Ŗpe# ew|@ʘvBܫ'tBg񚡩޷0w E26))B QJI){y6RvZO#3 ;O1bC@:*#ATU,%2h#)&DW8$mM%6'6FD;o1!x-O^+E~NMnx1VY h*2fkK1E/+QCҦd.1W,@M̉.EZ&53EIjo2?G E@(kAp4)wOboLSE>J{";j= euݻ-|1+"e%mQJ[Yj:) b՛B@Od g)-Ojh eZ +{*"ϡDo~27 j.Z==mqK$ 6 @XW 45IXC6b Jp`{<|h.㺀pe y-Dң\ N EDa2;D'c,?@) lpfEO :e`ʘW @hՍ. Nq{JgYӈ2H) g%zj0i1^QA"022FE֬e*r( *U `{ؚ|aO쑆9Hg@( h26d&pY\-Fc'$l16(-vCy/{j>-#+.}*`nPo;9 b2`n>r! {knvR?F0%fQN뻧i`^UIy$^ <!8n78nY{Ri#RN6@kd)?i U'n醆L3]Í.r9ҹRSe[^^Já^p&x sT$zO J ?|2CgK[t>?P%sٽy60u,$D+<+%u: ^d$f[̼fjCz<=g*Ӥav{Zpj$ҙ3 wQia1e0GU45Y#fTB@nvwPV$.9G&pH'm?h8n#(ԍFnV@l 6ON:١C~{Qe:9ȋz6A#ɧ~2$2(8CDPb翨{}/D^d9 DGld,38fV)4-s܁N'3wiύH XI›j&o(#Ni-bCcCq^DC- LWJ9F!N%Ə\/iU~Sך|0o/m! XBm$zL]*T؝7s5B4s=,T*њN`1Vǻ-o}ZAfbV+N̽2 ?!K@͉P=0%2# J)—Zy!D2 N=in( *. +}CTۗ<ʠ &#v;$[1f܂Tʆ䝤1[nlu@p21aQ<,}1mZ+7-?} 1XPGdAol 3o#ԴUV;u;[&`^2jN4աr]6hY!ԯB?%T+,$th[ A,ZkViúx0p@x2;y"6޳4b>mH4>_W1;|Uim4]rV0S`yg"9XyJF% ]+ 0we#P\ 228.(_n=> HZv&': ]  꿱,Z 70n{GQ?7 DQWЁt@NG(1n˥ TFM?WpN+g[N*Wq9.,MW~$j܊ShA;IcQuX nN$\cK8?\o:ϴ#2u(̏Fdr; [8 x<_pҝ A6kbZiN#unK%SuqOa/$G4Y8zUS}BW\FLI*2$Haj#iԠ} 0! ]ѣzV~f ciꏂq|s>-o ;)n !?ШfB6#Okn1:2P5Q<0* ۩"ӂ&%MxtJ䌳糕7ÖQm#W8ی13i j,^&|5zzxHp(;!X(ӞL+Z6[SY<`l۫2[&u(:H3ZRZbj4u|AS[w ӁLJO˳kjWƩ+XP Df Œl'_]Yo|aѭm@RcYIY (SMQ.L' 'gE^jCG8T"HtЈ>15~y["n!DNvj.)̅a4Hw7,*<9}\*!nzhh &)*>su~Wf6Ihit W!F$s\Vگ2T΁|^<%|n+GjΏ<<;ݵ"@4FYSLǃ@9X7,>aq&rLeRӸJ`?,ƘoV֭V^5᝺3J oDc{ *JTKoCJ(OxK/yFY|ib\ 7Ѩn(,vSvW{LjD6Pr]Ni;2bnQo ldu/vlܩ RA~H(,`KpsRez*/ׄo~_mj2)  (?Rjː˘_e~%b _JQP7BQ]cH/I+(깻y8eKdH TԪEZh`WH{c̦[|2oM~Uf;[!*ZR,eyRkIwoz'_J+ͪno(AD.!T0 mc.O@ k%+Nu^A)Bs:6|bFtXd- * Qs|g(GIe4]T2.ڍTxM1d~C`+>zlީ Y L) qQnI`ԜSDq Y_q%:TM' Hc@7*&٤@:AY-h*b=[~?X[΄4Vyl"&qb_ ,kGT򍁭3`3 uӁ-~U7!M#Y∺Å^Ԣ_?b#{eDRRg_fȿ04]d Ef7lrz|&xGY/Fcl4i^žuyƤc5y'gs࿜8Jv6)vg SJby\͔^`c@_-,w%fRocb*W 3. f4(kP|:="yX^X.@Fdp[`$-M1@.Y>6 7z^wVɍˣWrVJ9 b$!b, %Hs -Tx!@P,U[5 ra[ʍeW:X5UհFP[.z8 %#3뎬}ʤ.4E)zXh!o!UnDPRnb\Y7 Y3 b|hM,!SEIǃG+$V z4+IG%X |~΅;`&И_}oߏUAHBEh`-#T3H^X0d| p2+D5FQ6а[<sɭgpwls=7)#K^\ 7K\hTtQ_ V%Ywd ɩEqTn\R| ]hk+xdG#petdYrRJ Q^2ѺEu~rXZ>0RZljU!cZjnMHdTl'Jq8],b/Ie=0`^+dQn_9/~*-ReZ<ȾՏa-JF@qz"]-7sg W存2f&90F$.JOd)@AX/B'AHF9C,oFر"Ai/WkrV(hm^sXmqĭAe[E5eǩ xmhn:ovw ;u%"b7Da0B' f-B^EA &DUr7^ףDWI4#Q1j1g8l5+P>J { Z<⫎CL9HE`Jb"sܒrMqDa:U.eRž@ 6:4i6KșSy)JrtTtTQ](Nwtfњ{- @/ZcQ`#3CI9k!qe= pRT*MY=Ra m ')ҷ#yQΊ{?ڊfcJ;A7Bd;C2Ȏؓ py\ hXmUwh8Ճ! ~mj18l{Ȍ Ow;Hl ĘRnv)'*[L>(lTk?֛EVL4ܵ)t֮* ⋏LJ26Mh4q쑱+Z)Fbo~ 3Qm[F2*WwT#ʣ'ddd}^pJLIR/٩ h6 pPHg ʱQ:,QwJlg%NJq z2v nst C( |&ϱPe0D YeoM'F7~#ð p_v5?oK?[AN]Z4X@Xa(/4$@NZ 34~1{P*bZq=v|*5spa0q M?5 f!fxRH {s"*p]j`nOf6Bd3_\%*Cj_N٩Kiͥ2e)k[_Sh|Lyi⎢?'8B)|'hTҝ=WyS°?veXφHw8 ,jմ3G孁uS]o2گFɋ t $N(D*Zetd2NUQ0 XSZ}zއۥ5{%`yԌD|Z_hjb qq #nHU|)η$">$5k$uucɑC|ݣqڀc? 'ۡԇwjgtBE$>(?җ(r<=T\l'tU [C}v^v=rMR;@(O88 쒊gf(6HN OWr)2L's8tj? 4}š;u ވb᠆5-âPǬ3>FZHu_<9)W˾VF\QK9i^[~H4DP؁(Eاz"2L: "#n$d/ U4*+Űs0^"V:W9PZWlsv{M@hF#+M+!G~# \v^61mv2ʢh$NPB)K/C_|@dv\[bC Zw ^6me a}NX8z*%L!0IY((iim j=5<~

h;bLnʝ 6g2p&eլ` ԝ5?]K7| ǀ}1rYZ7n)>ۭA^SYԥ[mBj$RsRSN"C/V2NMp`rwo$bSmEbei#kA_p졤ݒ\Oz+yi"%U_$Wl6|dfT2K Ƣ,gσ! CB6uKMbl~~m%? +#;2ZkzKx-F] ^]%)պvݡ;fr:u__R'D n`%DS((@NqF**$)e"WOtf\Qg|ohwlIjN!Z7{sˣY%oPUdf a8B!뽼 \.y_ I-R33]x)+@"P[ \cyYBl> m31|3#WҖNi]"ZќkaM]yV'b/$aZ:~-1CmrG1`)ẎhcC,`vTI`'Ϟ<_Cg(fceQXhtymvߺT 6\O* yjuynAN؉FƆV;N>CG>LÆBȏpt,ߗn#Еn y*wъ5Lb-vQ$lMaʓPG}~C (꩜^(j?ٝ,\J);eH.iݯl?m>'K崞7w=A nf7)Zf^!VS 5) d/h$^>~ɥgd R6tꨊgSLzRT#i+r&r14#$l]﮼Ŕrq{aR&} ]SOUݻ qc!7,pg}$iJe>D*#b8hU&@? eH=#!Uoᅧ&r>a(]|f4"D1bH~5WAyxј^B;tS"̪)9c._6U^Я2Lkki~_̆ +w(!7~97u``pQ&_D@ͽ;y0X| R[:ve"Ի[o?(Po 1XF2 u*Xe 2.]s:vFE>?;o=ܐMAy AJUTԫh-L1l9/nFk۾] 0$\4ͺJB(R@2-Yn1V^WTp6uN9p44¹8Q{@41DzK׎d9*'|8L`.7p ye 6%z[U 5Vi>6ScDY(֦JoF`7-9À7k@z//~thX|-E~Ԥ>`JLcY +fq 8p٬.6c❗}y0(5aiGӂ6}gmW٘Z+wX[>{fr}WSoX`1F/&| -뤨,DowP !2x"&_Ν )jxUM8zci13)o#LDD4P^ `6+@ҭ#FzG++Lِb8xr^&|Lnw>_±27 _m8{uލj@GCb`R6S %x{nL|bU,6~"ƀ#z UJPԏi~|fk^3?)aH5hW6F10˨Qޅ .(z4i%?HwlkCYQ@3½ƲtbvDЕ(7`K55PNgNu$;J`nFcI&1qQYfz#|`cRwU mKm` ) =Mo9NW@TP)KA[ V EO>m7ʹIҍ.60(i/h܆Ԥ[NQmAV}9$ ";OZo| p"!@uA7dHKЬg1,jU uO,W4L #˖xyʿmHe}3Q Ҋ4[HrrY'@ߏ-(gZ4 @ZDn"D1*ۀ)L ޲/'*.no)fvm Jٝ>U!{:(Sʋxmn sTMa5x1ybʤZl L4OF/t,< b>9e@VcUƩĴn/%)ڤލɏcs]qvG>+K)O0!Ħ1nHg l4RUN/2)3/p 2rZlAT^)zHs1I]iv$itQڴ/ Nxkȅ]ZQho@XI1%B(y &wUXB¥jì$?'hQT :+T5j(Publty)h9᷻ne777qmuo &+C#ۣq0סd6\3 ۯ )sdmi } lԥ9̞ )Ƌ޶u(Q@ǻؿۂ ZaRz5! U9(:"C8j-K+/P=[ey@Kz#DUƵ.cđzju{r7#AnC[98<60c:udR!/ kYʁl 'fM"h,e'ol6U .Ki0rljK9}y q/{dԜxST #, 1 XDx|scaIksr4S`فh. 6WY|mt`nF%b=1xy{Z 6t3L7j*TV d34LB0e<&Ǵ!طP"E3+U0B@ ڪOl(}*+PmOv؂lF %t~\t0mwh60m3!|`/%wh)LqH"ҕahϊBJQپQBT XQT_s}Enbܐ\8hw.[prNDr|`@2>58ZO[[%9ƻ <;ՃIzۜ*y׻!dξ CάY W(x&©K)JV2)gJhiyQPGzO4E]ɢ졬.:iUUnKM.@0"wdl,(a->pE.Jgnˣ$313`l5upS8PqDI}P8Z Dr'ly{Tt<,Nj8ޑDX<ap*~&~]BN - u0 vÉƛ'uS},Fs)OYN])-(lb8Ls4V~E,? yii:ex/ 'I8u_szejBGZAGWX.Y"۪Eta)W:eP*D6^s]!2"JbDbOs6Աک}YrQMy ?y{O5ثL5&~jKp32k jYʅAgdg"FI0,Ŋ`w\)pg-jJ|gP sEƻ4Zj'Q [hARN[_QWm/Jb4qmKwϖ]64Y=BR,"4* @_˯,;u1ϖמ;^8 t-ED¸^FG)A-N][< IBWlPOr(䠲i$_(G:&ܳ;uK|9XIABm3í꒓S'=Y5 Q*cJc#diOn|06j LHa,'?s"fUbݨ\Fu)TWQs6=? l;s1jJI? ~s>tR\PVs1)K%l\ EKS4VÂ^I en &OdUiF2.[a(i\LkcFQ9 DKˡqvi`juO;?P\4ݘ^Ww#w، YO)iҏ BT׫YlٚND|p^܉ JxoL%T-zޮ)̠0G[6 aalz_EУX @({}4Haw P`ӆzrU/#KQpϏܲrv 89-,Obn>7T"-#gl KӅ7>9_.ᖹ ,1QA1D W|h^N5 3VY hJkb"ϙb> JKdȸYbc/%KF}݃BH%v>yk,x9{So[Y`舩ߒ/w#{D ^Eģj13&z/幀@ށ.,Z-We=sQS=Rz pp1-Go_~ 1T_h<.) L )&6Mòc>; lGQKձM0%./˦;'SFQ"!)ISBh2R4sYIHHE8 ?Oʭ KvH.tKC֓bt.)_hա[J;" ~5)ь|\})Ԅ<n̖N[FooM sՄξi F^.s- ihTM{~{.%VqJam":6^4К|De[GP#!o炸e=C'4B qUO3# )Ar3k9 l'1abVMr'%$A֍'SwVl%'FSLgDI&PXCO)t]?AͤR,0f}H 2!JkL7J>x}R^=KAWdTm{Z'6ϹɈңn5O[ehpT)F0c4NjKܟWN=BAHu,ʛH0, ,8jΙa\̃ւ:WPkδ @\G\cq O;KxT cemxAB:­G{6~Ӡ GOArve'= JYD~k#J%B)x+GߺelߔyPYW1Q8uiȈ-?z %cc6@I7EfGc%Ԓn9l|ՊAm=avV_h=³~e)'+Rm2n 6>ѤNp ԼAq RѓʈAp||s/2OeמA:(e]9;gB7!0+ 5+A7+Q'5B- ǎBV+VPDͻGZ}_+idBfo7IF٤@- $4 %/R-R[0. 騿OMH_]P*K笍Q P C1~.=**'Lh1&JZq̞,NoTss8j%ln;I] 4vRBЊ#_:<ї7M!p[ <f .^f„A<v]Fo)DlG|zp]4O3.ÅVPXޣ%*0l @:9Vӧ+>ІIxڔM[&uuYRrD"0PƪeKV_!gNc o㋴g)\Lt &60+~룇&9篩U͹fC@͆O[f*z;n[l礴 jנ+=f)}G&&tab쾐kBeܨw_2rQeSOց *V&\j`lӔK_>d*:zY eC)6-Qura:q/56>:*fc-Aַ\vER#l=N!U[E 0KTX^k3(çm}d`cَgɛ~B¯@I݂c6%My9 Қ63<44dxvM{^E8Qν:oVf3=KË>3D7U tB'M!5D~:唯 hvʛ/,E˾ 9z4`yX4^[8r-8ǿy1^ÏB})K=*rsRjn hXD1 l't ""kbR  ) `N%`q\.fU>CwüLʌ{ Ttdm}% t"['E5暲 :eg1J< hq$#'D]Ǜ+T{79u&$3F7.jx.tP]ۗ/U-mDZ83Z|5XO7ʷz)`;<`*'o1B:HsBW+s/&wZ dRTBf1Ie }Lއ 6GߌϴCѲ_ɔ`K@ eB%s}YJSHorM6'BȸYڳxm%r7y NGs?tqFX\Q-q):a n$7ɣ ,?mB6-+wV/@5|l8]-}JFExiTn@%@,o0@}ŅAIہNe/ҖDK s6 \4aQ]L *  h$}@a ȝڸ^w';㈐C&%h :/S# &6&"i&+lXi|R+ H5%黉'jNYVuW^KR. S+*lyZm9Ve#s`%yS[SW|7ߑ♺]<ъׄS-R"R>乊#$-ʌ2gH-M֮G0 ղhzܞ: sQ$"9B PMh/K TIEsV9uF ~56|DT7\@l9m33P1VG #Չ=29V>5ߑ$VӶRNT`oCf08`*p+b&c/΄-mtG}$ǀUIoU"Yk-!ZaȕEH3Y!?XQm5`77>*5VV[=8띺N$6kEv7|XH8⠒T(4[غSG}%_{GDhq2ELn]Ѳ@G8#6 W1+*0ZQ'\ h<jFM!~o?_X)N]ip1J:s@lCe)xW͐5aeaPhf2ar'GrAΤTU\o Ǖ]%x0O~h7:UdF#C6$WT@<1f;{1avJ^4Z'Jj}u8(rک+M}uD+hgYA*س(C,2ʜr<$j`ٌ0:d_¼?bo]=6gѠ+KsjQ\O )[y\0XʷMCQYJ((U"@izJ6uOY)SQ(agL[ٚ D8C ^=6^ޕxTmeF{ۑ8z"4\L T~S^ANODB/'F,z:sJs@%JQ@kP"0o=䃺k61p$ͨ.*4Dp#&x`4 =3j_7)Ð<\lj18&{ru"f[/szY)fQ&bNiAE}&ʮ#'}k@ L,{|9R)U474,JI 5pBu /<:oE.4x< W-UD6.% XRKp1f"-'hg:'`rרp7Ym!ARGh7 ! ˤA,R J,’NA'TVq1[45PcLOͶ+~`}޺ۦFcq#@C*C+4k[->UMgNX#o9K)gV}b4{,s&pڟ{knSDP-vHZmɔ✓a4ʆhsCH榇Z֯䋞a/WCQEPu'FsQsNi)E{ g /Ü% İ[V bBy[rau ^t􉦸}_?%/X;C5i '.ۻYfRbȠPmOMx >Ct?`ÙCKF!3!z /MQhY< pAt%jȑdG%/|FfSrc9HYk  .YS7F>64Ҳ]s~p4w_XU€1H)-7ZuZ8'4|zIUܭ||4YS:@8B}Y>ؗE }p fVWr4d-"czm0Ear\M8 "%oϙz+[SW8#faNbo#MqҳV,hQ[rYY2@{={ԭ&\tUHYQ'1l9dŵgѹ]xbB2oNml$'gXBGeD4Iu=`A^SRcvw)8J_)Z𽬎znC5Q1jҭ^-ڇck%fv?<HeV4s}[;o`n~>9XAWg&^<5<glS^`>IZPӬ<[x]>PβQܜJ`ܱͩ%z BQe>y` ,{-3/1(oϖsWv`U HZ"4YV.[8UE,o8jS]KlcnֹNݗ.r FleYVaBڌdBDlCћ:[B_L] @aBn(V0TN\^*},Rdr~X;q8y8xkgA J)ğ?~#1H_$n.۝%K(l/ nʥ@[?Dd&g9<'hҪ] 1iީˁ N= 8q~}7BF6tm MYeyxtEIJԚ6 Kpx/x^,+ QCjma(6 y.g26ZF͔5o?`C(YDGwABۣ^TPc_fS/1 z]IFUOMfK!KZ- -L oAR+\eh9h|}^>*R2@0o%ztq+Rx=0hٹx.3LƊ0[6A+ v ZħsI*=[V~?agSMGD (scA;(ИI7^1</268 rAm!'t)LLqxj@]^Rt(QV_%cV`R(4ke%m91ًx\ԱAZU ezXouzհ(zxEoR F80 |B=aWB@S`e]]ȍ q`.x i \OL<ֳg=N"<~AI-9?A0*`(gf4~iroO L$wX H@+h#xl#hZY/RX 5 EY.|VC6gGDN0J.N;ohdu0neD?-@(fw؍@ Z}zK8ܯ]#Ib.^m!&JB1)mӶ e-)kMBW QWP ퟝZN>>n,=3/}xxF~,2BJ=֩i'{v{UqH^?I4 i Qlqyl!}7*]ZwN2*lJ0GVNrs;u`:Rf%!fCYu0lʱ* +dč䱼%;X)Y"|2m/8%fUEꏾɇ'xF6(Nm2;UůhA TAy{󇫇khRЉ ("kNzQ\g=Ey/vT=Q^تdtFs Ѭ8HʆH'h5m[&cGa4T(R@h 3bH! F ky*8Tՙ-`LYEtLtX ZnЉZ>}1}ZjO SH.]h):/k0j{~[RV5dʹEf}rGjOkm0ͻ>dq #SM#2j=zSm\# #vx2 v*'lp&ֶ^ |3V\4䭥q-*VmؐMzwg'1YCTIʰ4 DhGtVO6*ne2\7OPEY&tq|8"KXޢs)lٕ;ޭ'Sd8&D; {o94`Ԝϐًs^ڏ+jHqbc띺UQzsKK2GHG:p[he"x.H&׸~;?9"YѷU,;+«QVPS#m j]RUl"' lQvom OVکK-hU!#pp$]@l-e_:YPP'i';P,PezQ$ײb|1oḆRi<@HBYCƸ8bm^G(&.VUq,u-nyAܽtTO{.4PբA88Zt!Tr)tS>%H1n', )]g}9AVt6k|bZ"$1u xrp5SPe2\%B\Tp{)1V9H ]PBZz ]I%hb.ȚL vph(tx}&| =1y,| FR?_| j/HOl+cxI#ގT렇qWFU}aYb%T6 IBo~[C 6nawE]Z! S1_+\do/ͥBF,9I{ĨC]Z[ BeӑN4\mtE؃T=p'jXDb6e Y8k i F1pXl=nS7G8wz/"‡xD53CA.U>Y=hq8o. ?'g~76k9Pؐ)~ĖpANWrv ,{]7{fM^uݳSV;uۄ ($YKȄhx#5:p4oۮkغq`ʭU~Glʀs Q_ W,ZH 6.P*&ѴX=dzU*z=;z[RsӀFLo]ѐ Y(TJMTlF)h'X"tB*s,q \zP/ɗH",Y1WvO-6Ui6U5`_:P U+%twٳj׽Ok;$u_,"e( %)*Z)6j0k+dp[R IX3m:n\Ԑvt }5hOj<aќH \4Pt (r eJɫ4Cb~7, oN9*㧐_ Pȴ\ DЫaxQy^C@uVf H4Dr8ODq\:I =6`83e0B1j$¡~BcZ2P5-[Qn߾zԅqOql$ ac2Ÿdv`f9#X  FT=k :J=LPlݠ/! F\1A %Nd*ZH֎2W}&^o|Lz>/X~gR̼豶(*}ޯa)VWunL\Ek()+OY͛Iιb5>3FC] xQG)ݚa2d[T_)v|j FTj:U6~؈`ݺ猚-i_AKRFLH>yB` n;jHA.(ͫ Rd,ԃlشsޓA}8ݙ:){J@5dCJyTVϪ֎J`Oyrn2խn6۽"Na qd I@5m`q_]G! ugi u2lX<ɛrGVn3WiHu.PI-C\'w,!.:g!VVZPKyjFc;~%Ʌjy+Tu^EfVӇ?W|F-($Y[JB "4f$t9V1/4)i'TX:Uȳ:e'4KCY7vZܬqT:l6; LȐqCZ3DF J&k1lk˴2olt`TϯکA"𔫥O( *jmЂȼ::i#.0!h 0*kݛ |Im-, 5aOGO h1,;8ẗ.qIVWӬ=)ī7&xtY,\mF1xIS U1s1.Z\hP9պ›Ҽ&M#@WYdU'`T^O+;鄸ź>^pVdt7P^È:%& [6te ˒3FkZuRZAø7ǫk2RGfb1L{/ BoےAg%؋1WnŃزqc"{3]g!TȻڅl=T"Im^>/o\!EL5WO3q҃m^lV 0anHG<ű”2Z%/:& y:U4VZ1UG*u#J{GTl׃J*?_tS0 D:H5&5 R ,vDۊf0Y)IKQgȭ[`DzG91<Ԭ% vw<f Keّrv$ BC(Eϝڐ:=POŅ'e٤5fNyv\&A*UX(,Z곱 (r$yre-Յf>#t[G4g'n srQP"2;zI˼ ͝ J@ON2 . rh,*Q=LX[{O-Y"(K;wQͣR.0UsH>0:94RQS.]Lj J Ss*ȉЎ,'-om=i85zV꣦ce^vڼS7䁡j rd[IŢ tA!>2_gT*aS)\;"r[AOΌlsM2L[16Qd4KV=qqU`3ĸ05>V[N[S[ͷݾl"׊k2qh-G\G9Aߕ&KWl[ZXf#VI!a] .i..YOA_Su*.:X"-YBA{1`(T#MaR21#;{a>J~Դ6}͈m:Ίي*ܘBh?Dz>rR|e:)*u*$VzBpARsK֠I܆oC)| :e|u/kNz8]:][ ك˵Q;TFsT n3ќ2re$u[os ,ĆK[T Mi z$?vU/;'`BHv?v!6sQjSbHc얒ndtu*ͼ?|+B5aF$v g}dmcQL`n*Egrn\֖ʣ$C F6uTz}elM Q:Y.!s)(rYYEv L!+"a:^ ˕R0 a,;1f#LC&i-$huË)~t84걯 9Hsz%ҡ*a AnH\Bo%f^O:l9cx@QP8L _0x49JhUśO"o/^F۸PC=Q|5|93ԛYrc68bkVL]B-?1L9mrjy,̤dRK]H6)%s0!JOϜNIi*),z=L0% OAyu$N;uG/?||>~w>P%U[+Y4nqljhgU'tP񥷮^ )Y+78$>OrTXµeVȾ-yk?k3aj֏g,ϟ=?o:X/UΣ[hm,š|uO哫 A' >RqI$P?O갪uG ~qO!ˑ=g|yQȭz6<]7gXԲ3^fUHWM䧯#9אuYYҘ(YYp ُxOO}_C7#-EV;k9Ua㵧mͳ᭸ZrYB5z~wI[`s痷::0˃},I x5 7Ff }z_oƺ6EZJےޞX2[wqsZ U9Q$-=zϖ$xFξ7ngDqvwIX7XA,/MH7cg KLcQ_oSʊ鴖>#qim8RLG%m*W-Az2#usƧwwl}ZC#m)F xSCIW}`];3Mf$wā lQoq{Ł߫h&ذ2'yxuUٜuA)"#807MjP>le<].ALKݱnMr(61gYtc~JVƷc|w5p;@)-)k"u0]<& ǟPꐶV{s tVkJwIߕ׀C69=zJo4j3R=0!+f-% 7`{5A</rFvWflOZn&f{ж+4@yF.خg3#kZS]p i iF Z'^?; B#Ff!mGmÐF‘Z=;橜MظuyމJ}l= Hڕԝ|wHs\U;!wugZt8JkiN!IMSp7U m.JRJar&#f'Џ=YzжˍvWzUW)Uh }Oof6Nˆ@%qGfmfH飠㷛ֶ͓A/"JCbTbof{ж9kHmR[~[ѼZw&<n͏&V YrrUS' ΄ܬÿ`pB-=KwI7cq+_HpOf͓t6c=룖Dk5ܤ)nEskn!Lxj5 Y; 3%) [O/J/1EB$› 6>Ũ~qzݨ  bwJ`7Y=enmM4)UR |lmLCIk¦ݒ;?-}tU~tLP_%}1`l{@=@v7w [`ťx'p BĬ想~UHS^iބl: WƔl #!N\3n -m ;:2D?1NIЛeTk;&w~n47iЩ&e0g+m85SlxlW`fb^X'9_7j%f]wcl[#h [{+K盹9ǔKjӡ.PIf2XK[A(s˛Ev3{:1V,b5#^<D}3]̶޳MO6kj~cIq7Ρo'^8+އ4h}2lr[D sXۑMjh:F^\hvcB $%FҶ?yfFReb7ЙUi ttXRB$6ӱMP.=%<;w[?Qy8\?>S^YĜzwK@]U3YY8A?3ۼΧ5Ryۏ"݈.Wq0+l/>`ۛڍL )xӼ'Jiߏνvo۽;l]6>~R**d?U5= P1~>z 6v;n|orwgO0g }w;j?J?+pɝ/|FuTc [ƾ$Ŝј r!YsSBMœ.qݏ]hm''_4B _ zO&og{m_JQޝs8C䇻`*3X!;'fw&LE 5w6ڛa;޽wS5}|Tǡt^`DS=l4-o3E6$?_#o+{!ը!~^$¤{(p:b ^Ν2R",#}u HfQpmϙj;R@,z= >!E>Dsq$]^:gh3Fk4))ryHYBB[A&ɽ po'y?uE~2j1y֘Q!P:4tT+fwmOԻ"ht{-JyX>ŷc®Pd?^FZ#Upj^h*ie0B(rJ6x(mx+ E\g\AFFW\Є 5*O*$ܹڍ=/QTg3fg,,lਮ+Lv@m9c~Z gн&޿;(E:_\Eg~3a~~4wMϸ0ѡ0%um] v5SGFu$]!q!AZ/@6 Xɺ_WQ*n4قvLV-%?I=A FA h|iRZp\Q'V;h@{1۽I $ж;$͚0TςVsGFu5-ullmk':ѱ:&v4=""ݞ l;+eЛ(ap4rʯ:#ĩ#*zihuGZgg3Ց3bgʸ2O)G8_/"!/,(sxTo lg/bQ^)Q{j%Sb>NxW6h-߹+`,L<1Lvbf ]uC@Jә Zy9A -݈KqgȘ`3m3\C}[^0VNsBMs::SvQfˋg@&ˣ=M%,}1u f,˘)H&Xqmֺ)0b+ j(3. W 36 C )ݖhJnϊ?hkBە7;ƞ`*k;WYi]$&xB ĭ6Fȁ>==8sK vv&l)Í=aR9k1f L\wdTolkBv^sR4a8[CYH}gmFdp̓.EѭQ2bhT(tÍ;02/\f*gЎ-fz؇'{BFȦl.GaW=(_(T)WaUܴύn Ae5(0.*tΞfiLq,W%wqńx+1dm4M7@?'0ب^ڮFԹΫyPfNh\-7h`*[f) H1y/k$u7ӽK^C%;bjvs1y0e]6:Ø +E-W=cם\Vu˜iq;;&EN#*!8<6?m=h.g'FkXg佔h|'n Yg8+;F³){ؾ-lF#ann{teHbVTI]͵ό+F 06x?ڽsᔦyH&KkTm'0[Dn/&<[4[}Ӌ=bCvLk5L(k ;әҩ2?ZoӅ L7 ?y']bt9>n0Oj%q$%+t'"Otз,Q6;v$CBrlsYώm{)ĸ~0ZN͔Z^:#*>i^[P.3=NO,ob6lǮ֙azI ?=ѽ,\aTm'-鍏gB:ϯ6DZMa h} bsgg~qS9wffEK67' k`C~Gjܺu)5 jT!l#6-^\coW5uxӯOx{q{M ߛBa \l9To?zp_X|7]?ESZ)Kl<ޞndηtwoO7`{{~[;'=Y-݀흇 ޞnC loO|K?,"ZzIENDB`-DyK .http://www.ifrc.org/publicat/conduct/code.aspyK \http://www.ifrc.org/publicat/conduct/code.asp-DyK .http://www.ifrc.org/publicat/conduct/code.aspyK \http://www.ifrc.org/publicat/conduct/code.asp1DyK /http://ochaonline.un.org/DocView.asp?DocID=426yK ^http://ochaonline.un.org/DocView.asp?DocID=426-DyK .http://www.ifrc.org/publicat/conduct/code.aspyK \http://www.ifrc.org/publicat/conduct/code.asp-DyK .http://www.ifrc.org/publicat/conduct/code.aspyK \http://www.ifrc.org/publicat/conduct/code.aspDyK  www.icrc.orgyK *http://www.icrc.org/ DyK %http://www.un.org/law/cod/safety.htmyK Jhttp://www.un.org/law/cod/safety.htm-DyK .http://www.ifrc.org/publicat/conduct/code.aspyK \http://www.ifrc.org/publicat/conduct/code.asp-DyK .http://www.ifrc.org/publicat/conduct/code.aspyK \http://www.ifrc.org/publicat/conduct/code.aspDyK www.peopleinaid.orgyK 8http://www.peopleinaid.org/DyK www.sphereproject.orgyK <http://www.sphereproject.org/ADyK 3http://www.interaction.org/disaster/NGO_field.htmlyK fhttp://www.interaction.org/disaster/NGO_field.html-DyK .http://www.ifrc.org/publicat/conduct/code.aspyK \http://www.ifrc.org/publicat/conduct/code.aspDyK www.amazon.comyK .http://www.amazon.com/DyK www.amazon.comyK .http://www.amazon.com/DyK www.odihpn.orgyK .http://www.odihpn.org/DyK www.peopleinaid.orgyK 8http://www.peopleinaid.org/DyK  www.unhcr.chyK *http://www.unhcr.ch/DyK www.peopleinaid.orgyK 8http://www.peopleinaid.org/DyK www.plymbridge.comyK 6http://www.plymbridge.com/DyK #http://www.rospa.com/CMS/index.aspyK Fhttp://www.rospa.com/CMS/index.aspDyK %www.homeoffice.gov.uk/docs/bombs.pdfyK Xhttp://www.homeoffice.gov.uk/docs/bombs.pdfDyK &www.homeoffice.gov.uk/docs/bombs2.pdfyK Zhttp://www.homeoffice.gov.uk/docs/bombs2.pdfDyK %www.homeoffice.gov.uk/docs/bombs.pdfyK Xhttp://www.homeoffice.gov.uk/docs/bombs.pdfDyK &www.homeoffice.gov.uk/docs/bombs2.pdfyK Zhttp://www.homeoffice.gov.uk/docs/bombs2.pdfDyK www.mango.org.ukyK 2http://www.mango.org.uk/DyK www.odihpn.orgyK .http://www.odihpn.org/DyK MineAction@un.orgyK 2mailto:MineAction@un.orgDyK www.un.org/Depts/dpko/mine/yK Fhttp://www.un.org/Depts/dpko/mine/DyK www.odihpn.orgyK .http://www.odihpn.org/=DyK 2http://www.peopleinaid.org/download/Security1.docyK dhttp://www.peopleinaid.org/download/Security1.docDyK www.peopleinaid.orgyK 8http://www.peopleinaid.org/DyK icrc.gva@icrc.orgyK 2mailto:icrc.gva@icrc.orgKDyK 2www.the-ecentre.net/resources/e_library/index.cfmyK rhttp://www.the-ecentre.net/resources/e_library/index.cfmDyK  www.icrc.orgyK *http://www.icrc.org/DyK www.odihpn.org.ukyK 4http://www.odihpn.org.uk/ADyK 3http://www.humanitarianinfo.org/iasc/prodsec01.docyK fhttp://www.humanitarianinfo.org/iasc/prodsec01.doccF@F Normal$a$OJQJ_HmH sH tH j@j Heading 1$$$ & Fi 7x@&a$5;B*CJ(KHXph^@^ Heading 2%$$ & Fh 7x@&a$ 5B*phH@H Heading 3$ & Fjxx@&5R@R Heading 4$ & F_<@&5mH sH uPP Heading 5 & F`<@&CJmH sH uRR Heading 6 & Fa<@&6CJmH sH uLL Heading 7 & Fb<@& mH sH uN@N Heading 8 & Fc<@&6mH sH uV V Heading 9 & Fd<@&56CJmH sH uDA@D Default Paragraph FontVi@V  Table Normal :V 44 la (k(No List R@RTOC 1 7SC# xx5CJaJ(mHnHuL@LTOC 2 7SC# CJ^JaJ mHnHuJ@JTOC 3 C# 7^7^JmHnHuH@"H Header  9r OJQJmH sH uJOJ SubTitle 1 $a$5CJ(OJQJHOBH Normal bold$5\mH sH u:OaR: List Dash 1  & Ff<Ob< Text 1^OJQJfOrf xl248$dd%d&dOP[$\$a$ OJQJaJTR@T Body Text Indent 2 ^ mH sH uVOV xl29'$dd'dQ[$\$a$ OJQJaJJOJ xl26$dd[$\$a$5OJQJ\aJT @T Footer 9r $dNCJmH sH upp xl458$dd$d%dNO[$\$a$6CJOJQJ]aJP@P  Footnote Text $xa$CJmH sH udSd Body Text Indent 3 h^h` mH sH uDBD Body Text$a$CJmH sH u@@  Comment Text mH sH ufTf Block Text!`dx]`^B*OJQJmH phsH uT@"T  Balloon Text"CJOJQJ^JaJmH sH u0U@10 Hyperlink>*B*D&@AD Footnote ReferenceEHH*B'QB Comment ReferenceCJaJ:)@a: Page Number CJOJQJDPrD Body Text 2'$a$ mH sH uJQJ Body Text 3($a$56mH sH uPCP Body Text Indent )h^h mH sH u@"@ Caption *xx5mH sH uCargoC+$ ) u E U%"%dx^#6B*_HmHnHphsH tH uhh chapter,$  x<7$8$a$!5CJ\^JaJmH sH tHu.X. Emphasis6]X%X Envelope Return.$a$CJOJQJmH sH u@V@ FollowedHyperlink>*B* RR H20$$dd@&a$5CJ$OJQJhmH sH uH @H Index 11$8^`8a$OJQJN0"N List Bullet2$a$5CJ ^JmH sH uh62h List Bullet 2 3$ ^`a$OJQJmH sH u`B` List Dash4 & Fe ^OJQJmH sH u:R List Number 25 & F >TTf^`OJQJmH sH u4!b4 norm6 & F T^rT Normal (Web)7$dd[$\$a$ OJQJaJDD Normalita 8dx mH sH ujj record;9  \ l0! $d^ `$CJtHDD ref.date : p#5CJOJQJ*W* Strong5\88 table<$a$ CJOJQJDD Text 2= p5^5OJQJF>F Title>$a$5CJ(\^JmH sH uff Titolo 1_sbt ? & F<&CJKH OJQJ\aJmH sH tHuBB TOC 4@ C# ^ CJOJQJBB TOC 5A C# ^ CJOJQJBB TOC 6B C# ^ CJOJQJBB TOC 7C C# ^ CJOJQJBB TOC 8D C# ^ CJOJQJBB TOC 9E C# ^ CJOJQJfbf xl258F$dd&d'dPQ[$\$a$ OJQJaJJrJ xl27G$dd[$\$a$5OJQJ\aJVV xl28'H$dd&dP[$\$a$ OJQJaJxx xl30II$dd%d&d'dOPQ[$\$a$ OJQJaJ~~ xl31IJ$dd$d%d&dNOP[$\$a$5OJQJ\aJll xl328K$dd$d&dNP[$\$a$5OJQJ\aJ~~ xl33IL$dd$d&d'dNPQ[$\$a$5OJQJ\aJll xl348M$dd$d%dNO[$\$a$5OJQJ\aJll xl358N$dd$d'dNQ[$\$a$5OJQJ\aJll xl368O$dd$d%dNO[$\$a$5OJQJ\aJll xl378P$dd$d'dNQ[$\$a$5OJQJ\aJll xl388Q$dd%d&dOP[$\$a$5OJQJ\aJl"l xl398R$dd&d'dPQ[$\$a$5OJQJ\aJl2l xl408S$dd%d&dOP[$\$a$5OJQJ\aJlBl xl418T$dd&d'dPQ[$\$a$5OJQJ\aJlRl xl428U$dd$d%dNO[$\$a$6OJQJ]aJfbf xl438V$dd$d%dNO[$\$a$ OJQJaJ|r| xl44IW$dd%d&d'dOPQ[$\$a$CJOJQJaJDD xl46X$dd[$\$a$ OJQJaJDD xl47Y$dd[$\$a$ OJQJaJH @H Index 2Z$8^`8a$OJQJH H Index 3[$X8^X`8a$OJQJH H Index 4\$ 8^ `8a$OJQJHH Index 5]$8^`8a$OJQJHH Index 6^$8^`8a$OJQJHH Index 7_$x8^x`8a$OJQJHH Index 8`$@8^@`8a$OJQJHH Index 9a$8^`8a$OJQJX!@X  Index Headingb$xxa$56OJQJ\]B^Q6 i ED}Y2EPNfB\Ve{_55L6Cg$lBmu  !"#$%&'()*+Y Dp> r  9 >~NN- 234]^_wxy4Oop  o  n lkjihgfed_]\[ZYWUSQ 234]^_wxy4Oo      !"#$%&'()*+^TWYBGmC߬ 0 ]    B w   ! `    + f  <=>?@AVW\]^_q+,12"x6eA M  j M fb:Vv,Tq4# Y$rxe aLZS R !!!6""#h##B$$$b%%D&&.'''5(()))D***d++,{,,:--.|..u//>00 111"2|22>333P444Q55667_778u889j99:o:p:q:::;V;;<o<<+===B>>>Y?? @k@@.AAADBBCuCC/DDDHEEE3FFF#GGG>HHH&IqII J`JJKPKKL{LLMmMMNNN5OOO0P~PPlQQ*RRRWSSSSSTTTTTUU>V?VWW(X)XXXX#YsYYYUZZZA[B[[[\>\T\m\\P]Q]#^$^^^&`E`aabbScTccc/eSeseyfzfSgTgcghh"j#j1jkk+m,mooopppq r rsstt v vvvww:x]xyy[zz | |4}5}}}~~\[\342Fkl@AËZu>?vԓՓ !֚ך*I5{|Ɵǟhi_`5ARS:;23Φ78PӪ.fPQcɯ\jklm}~ڽ۽gh+,^_ghyz79?+7*3WX+,}9\{CfCVW12PQgh6QQRZn+R46C bct AVz&'`a )   _   ( )    ! *qrgh&'RSpqSTt:;XYcybc!"##v%w%&' ) )))**h**++,5,s,,,,(.).//Z0000^111q2r22F33N4r4455*5F6G666P7t7798:888::&<'<==j@k@@AABCQCDDDFFGGGHHIIJLLMLNNTPUPSSUUhViVVVVV=W>WWWCYDYYYYZ ZGZjZyZZZ[[[H\b\\\j]^^E^F^a^__``NbObccceeEfFfMfRgSggggi ijjkkzm{mmooooo!pLp`pppqq"rrsssssttuu'v_vvvvvwwVyzysztz;{<{||~~fpԁՁ#$؆ن͉STF~ O1vL֏Sox^_ؔٔ3ZחؗSTəi[M!UxߠndSfܦ;b9:'{|ֳ׳)*>ObCDbctXl  U1O|}{|\],-9N{2Dq7=>st<=DVW78D  !:;EFT~@Amn+-`al<elGH~op)*)*@A !g 45&'h i   ! "     ~    67Jh ij3KMN!5aw_`3NO  !""=#>#$$%%''''x(y((6)S)c)))=*g**++,?,U-V-\-l-{----.'//0C022a4b46666&8`888t999W:X:: ;C;<<f=g= > >>>?@@AB BBBBLCuCCCC0D1DFDQDdDuDD>EEEFXFFFFF8GGH?HbHcHHHIIJJJJLLMMOCO?Q^Q5R6RR S{SST&TITaTrTvTTTTTUUVVyWXXX YZZ[[`]w]``%a&aaac,cddXfnfrgsghhk(kllnnooqqssttuu#vvvvnwxwwxyyyXzz5{v{{ |A}}~,m&'z{9JVWԈ/}Ȋ7oGxyNO{2gЕܕblmnљ =HZ}ͥ4HwتB«0ì>\XYl&'бѱ89WX*+:Xlʶ #<no*3PؼټKLhJKEI]GHL01_=g  kl{|!"&GHKqrwHILnos '(,KLPopx!?@Dcdi236EFLnoy@A  .?v~m|2F$%12<=ABVWXYp//c)vC&'I2hyGC<}gh}ij>v0UVc?JnORSK~&i2@A0 u      / J ]     J P V   S      &'kji"#EF!AgBfg  ~:;s t   !!B"C"""y#z##$$%%&&$(%(r(s((@)])))*++#,,-@.A.S/T/00@1A1]1*2+2e3f3,4-444445O5t5555768666_7`7u777777778c8u8|88888888899999 :&:':3:D:e:::::);`;r;;;;;<T<<a====??<@=@V@l@@@@A[A\AAA7C8CzC{CCCC7DsD*EZEuEEEELFFFFFFF GG"G4GGG,HVHcHsHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHIIJ`KaKKKKWLLLLLM'M0M7MMMMN3NO+OVOWOcOPPVWPЌ'rˎAђҒfO"klOPƗĘ%7878כQ_`abyz34ϞО?@Сѡ%&0XYƧۧSʨ{abpժU]hwx  +,<,-ݯ-Y'(Ccϲ`KLwxعٹ߻5wLMFGZh=*)iKL`=k *O  .FDZ~>?Pxy{|[\@Aide12abp0KXs|~FX.5x]:;  -.^_        | } P Q d e   "#,-3RSdeh i i!j!"" $ $H%I%%%%O'P'''((,)-))*+++++[-\------#.$.0.I.....U/V//0091:1C2D233334+4,44455,6-666666;8<8::::l;m;\<]<>>.?/?PAQACCD DDDDlEmEFFvGwGGG{H|HIJJJJJ8K9KKKLLMMMOO+OOOPPPQZjZkZuZZZZZZZ[[[F[G[K[[[[&\'\0\\\\\\\]]]c]d]r]]]]]]i^j^^^^^_ ___``PaQaaaaa b bPbQbbbbcccccccccccccddd$d-d7d@dJdSd^dhdrd{dddddeeffhhiifigitijjklllfl}lllmm mommNnOnjn-p.pgqhqrrssuu;vPvwwxxxxxxy yFyNy{yyyyzz{{{L|}}'}}}}}}~~~$ ABJ߀'eDCAb9n7njk}BGMՋ֋"k5]Ȏp֏ 4z&'0ZёEFPڒے@AI}~  0eu:$ ƘǘhișBC./-.I\ow(Kɡ ;KL*=RSiƦ b٧Nx¨Oiͩ[٪OP #Mn3W|˰̰,=p 23:;EFֵ"4ƹǹbD)}l|w()8ghUVo0dDFijtwxGHO)*,-y{()TU!"opCRS.nog:j&[34=q()^_dyzYZ&'c]|"hiNOOPQR[  r   , - ; <   /Hi9z(+BC8r^-.7de!!"###$$$C'D'h''(****,+,k,z.{.00;0112j3k335l6n7778888q995::;Z<<<<<<>>X>Y>>?e???'@AAAACCDDlEmE|F}FFGGGGGLHMHJJzJJJK}KK+L,LLLPMQMYMMMNN9PPQ|QkRRSSSSSXTYTTTTUBVCVXXYYYY'ZrZZ1\2\\\4]]^^^j`k`rasa:b;bbbbcccd7d8dy?yzz!{"{z{2|U|||M}}~~0 y9h7?z„sˆ̆ljȉ'(Ɍʌ?ҍ:Bڏ%ʐΑϑْڒ|}”ÔӖԖ_aqrʙ=gtϚКDjkߝ:T̞ݟv.bc٥ڥABxާ"Yw:Qwst*+"wxײزz{YZ +<=op%&./YZBCHI[rsBRxD4kl~,-6RS]kl~%&[\] X:bu%&J[{  hi  Z[}~deJKIJ.45\]+g~@o9tu./?BCstfwBCwxN34|<r 0 z     N   I X      l      M  0uv78uv>aQ&z[`st=>z;w!2EM`abcdefghijk<D 9Qf   5 { |    !!2!z!!!!""$#D###### $$.$/$?$$$$ %5%?%U%\%x%%%%%% &$&>&X&i&&&&&&''X)`**+h+;,},,,,..//1122244O6P6Q6R66778 8I8888888888889!9@9\9h9z99999:::&:g:q:r:{:::::;;(;d;w;x;<<<+>,>g>>>>z???? @3@Y@@@@/ABA{AAAA`BsBBBBBBDDDDDDDDDDDDDDDDDDDDDEEEEEEEEE E E E E EEEEEE F F FFFGG H4I5IIIIIJJ*JDJtJJJ KLLLLLOOPPQQQHSSTTUUVVXXmYnY8[9[0\1\\]]/]@]]]]]2^3^K^^_t__````\aaaaa b7b8bgbcdddWeXeNfOffhhpjqjjkdkkkk&l n nipjpqqssttuuvv?w@wwx:y;yzz{{}}~~~+,\z؁6Hm~ 3<HTX`q׃@AklmnoABCIJĊŊyz{ً)7AVg|ό܌1cs}؍):IWvَ3Ftԏ*5ZuŐϐ ";Kfđ '<LYi}ؒ'3;McqsГܓ$Obsڔ!/@BVbǕӕ =XnҖ 8Ma|җIs٘>Voq˙&LZlǚɚۚ2^u4ClΜߜ I]_xƝם2>_z|̞1Lnß*,D[q|̠#%5Meš2Y|΢Ti|ţףݣ ?a|ڤ/Nkt*G`pצ(<Tmȧߧ #-G[gzԨ2\ )Wmª֪MO[}ʫ "-8I`tǬެ߬     >?m4XR ޸M4RɼbbA. !"#$%&NOPQyz{|#$23PQkl0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000g 0g 000000000z 0z 0z 0z 0z 0z 0z 0z 0z 000000 0 0 0 0g 00000000g 0000000000g 000000000000000000000 0 0 000000000g 0000g 0000g 00000! 00! 0000! 00! 000g 00000000g 00000! 0! 0! 0000000g 0g 00g 0000g 00000000000000000000g 000! 0! 0! 00000000! 00! 000g 00000000000000g 0g 0000000000! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 00000000000g 0000000000000! 0! 0! 0g 00000000000000g 00g 0000000000000000000! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0g 0000000! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 000000000g 000000000000g 00000000g 00g 000! 0H 0H 0H 0H 0H 0H 0H 0H 0H 0H 0H 0H 0! 0! 0! 0H 0H 0H 0H 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0! 0000000g 000! 0! 0! 0! 0! 000g 00000000g 000! 0! 0! 0! 000g 000! 0! 0! 0g 00000000000000000! 0! 0! 0! 0! 000g 0g 0000g 0000000000g 000000g 00000! 0! 0! 0! 0! 0! 0! 0! 0! 0! 000000! 0! 0! 000g 0(j 000! 0! 0! 0! 0! 0! 0! 00(j 000! 0! 0! 0! 0! 0! 000000000000(j 000! 0! 0! 0! 0! 000000(j 00000(j 000000000000000! 0! 0! 00000000! 0! 0! 0! 0! 0! 0! 0000! 0! 0! 0! 0! 0! 0! 0000(j 000000000(j 00000(j 00000(j 000000000(j 00000! 0! 0I 0I 0I 0I 0! 0! 0! 0! 0! 0! 0000! 0! 0! 0! 0! 0! 0! 0! 0! 0! 000g 0000000000g 00000! 0! 0000000\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0f7 \>0\>0`؞\>0\>0\>0\>0f\>0\>0\>0 \>0 \>0 \>0 fjf*\>0\>0<\>0\>0<\>0\>0\>0f\>0\>0\>0\>0\>0\>0f\>0\>0\>0\>0\>0\>0T;\>0 \>0 <\>0"\>0"?f\>0$\>0$f7\>0&\>0&`\>0(\>0(\>0*\>0*f~\\>0,\>0,\>0.\>0.`xy؞\>00\>00\>02\>02f:&\>04\>04\>06\>06f7\>08\>08\>0:\>0:f~7\>0<\>0<`lm؞\>0>\>0>\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@\>0@f~y.\>0B\>0B\>0D\>0Df\>0F\>0F\>0H\>0H'-d\>0J\>0J\>0L\>0L5\>0N\>0NV؞\>0P\>0P\>0R\>0R4=#-\>0T\>0T\>0V\>0Vf~7\>0X\>0X<\>0Z\>0Z<\>0\\>0\<\>0^\>0^l\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`\>0`l\>0b\>0b\>0bl\>0d\>0d\>0d<\>0f\>0f\>0f <\>0h\>0h\>0h <\>0j\>0j\>0j$<\>0l\>0l\>0l$l\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\~00 @1\>0\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~00\~000-@0\~00@0@0\~00\~00\~00\~00\~00\~00\~00\~00\~00\~000et\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>0\>00D <=>?@AVW\]^_q+,12"x6eA M  j M fb:Vv,Tq4# Y$rxe aLZS R !!!6""#h##B$$$b%%D&&.'''5(()))D***d++,{,,:--.|..u//>00 111"2|22>333P444Q55667_778u889j99:o:p:q:::;V;;<o<<+===B>>>Y?? @k@@.AAADBBCuCC/DDDHEEE3FFF#GGG>HHH&IqII J`JJKPKKL{LLMmMMNNN5OOO0P~PPlQQ*RRRWSSSSSTTTTTUU>V?VWW(X)XXXX#YsYYYUZZZA[B[[[\>\T\m\\P]Q]#^$^^^&`E`aabbScTccc/eSeseyfzfSgTgcghh"j#j1jkk+m,mooopppq r rsstt v vvvww:x]xyy[zz | |4}5}}}~~\[\342Fkl@AËZu>?vԓՓ !֚ך*I5{|Ɵǟhi_`5ARS:;23Φ78PӪ.fPQcɯ\jklm}~ڽ۽gh+,^_ghyz79?+7*3WX+,}9\{CfCVW12PQgh6QQRZn+R46C bct AVz&'`a )   _   ( )    ! *qrgh&'RSpqSTt:;XYcybc!"##v%w%&' ) )))**h**++,5,s,,,,(.).//Z0000^111q2r22F33N4r4455*5F6G666P7t7798:888::&<'<==j@k@@AABCQCDDDFFGGGHHIIJLLMLNNTPUPSSUUhViVVVVV=W>WWWCYDYYYYZ ZGZjZyZZZ[[[H\b\\\j]^^E^F^a^__``NbObccceeEfFfMfRgSggggi ijjkkzm{mmooooo!pLp`pppqq"rrsssssttuu'v_vvvvvwwVyzysztz;{<{||~~fpԁՁ#$؆ن͉STF~ O1vL֏Sox^_ؔٔ3ZחؗSTəi[M!UxߠndSfܦ;b9:'{|ֳ׳)*>ObCDbctXl  U1O|}{|\],-9N{2Dq7=>st<=DVW78D  !:;EFT~@Amn+-`al<elGH~op)*)*@A !g 45&'h i   ! "     ~    67Jh ij3KMN!5aw_`3NO  !""=#>#$$%%''''x(y((6)S)c)))=*g**++,?,U-V-\-l-{----.'//0C022a4b46666&8`888t999W:X:: ;C;<<f=g= > >>>?@@AB BBBBLCuCCCC0D1DFDQDdDuDD>EEEFXFFFFF8GGH?HbHcHHHIIJJJJLLMMOCO?Q^Q5R6RR S{SST&TITaTrTvTTTTTUUVVyWXXX YZZ[[`]w]``%a&aaac,cddXfnfrgsghhk(kllnnooqqssttuu#vvvvnwxwwxyyyXzz5{v{{ |A}}~,m&'z{9JVWԈ/}Ȋ7oGxyNO{2gЕܕblmnљ =HZ}ͥ4HwتB«0ì>\XYl&'бѱ89WX*+:Xlʶ #<no*3PؼټKLhJKEI]GHL01_=g  kl{|!"&GHKqrwHILnos '(,KLPopx!?@Dcdi236EFLnoy@A  .?v~m|2F$%12<=ABVWXYp//c)vC&'I2hyGC<}gh}ij>v0UVc?JnORSK~&i2@A0 u      / J ]     J P V   S      &'kji"#EF!AgBfg  ~:;s t   !!B"C"""y#z##$$%%&&$(%(r(s((@)])))*++#,,-@.A.S/T/00@1A1]1*2+2e3f3,4-444445O5t5555768666_7`7u777777778c8u8|88888888899999 :&:':3:D:e:::::);`;r;;;;;<T<<a====??<@=@V@l@@@@A[A\AAA7C8CzC{CCCC7DsD*EZEuEEEELFFFFFFF GG"G4GGG,HVHcHsHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHIIJ`KaKKKKWLLLLLM'M0M7MMMMN3NO+OVOWOcOPPVWPЌ'rˎAђҒfO"klOPƗĘ%7878כQ_`abyz34ϞО?@Сѡ%&0XYƧۧSʨ{abpժU]hwx  +,<,-ݯ-Y'(Ccϲ`KLwxعٹ߻5wLMFGZh=*)iKL`=k *O  .FDZ~>?Pxy{|[\@Aide12abp0KXs|~FX.5x]:;  -.^_        | } P Q d e   "#,-3RSdeh i i!j!"" $ $H%I%%%%O'P'''((,)-))*+++++[-\------#.$.0.I.....U/V//0091:1C2D233334+4,44455,6-666666;8<8::::l;m;\<]<>>.?/?PAQACCD DDDDlEmEFFvGwGGG{H|HIJJJJJ8K9KKKLLMMMOO+OOOPPPQZjZkZuZZZZZZZ[[[F[G[K[[[[&\'\0\\\\\\\]]]c]d]r]]]]]]i^j^^^^^_ ___``PaQaaaaa b bPbQbbbbcccccccccccccddd$d-d7d@dJdSd^dhdrd{dddddeeffhhiifigitijjklllfl}lllmm mommNnOnjn-p.pgqhqrrssuu;vPvwwxxxxxxy yFyNy{yyyyzz{{{L|}}'}}}}}}~~~$ ABJ߀'eDCAb9n7njk}BGMՋ֋"k5]Ȏp֏ 4z&'0ZёEFPڒے@AI}~  0eu:$ ƘǘhișBC./-.I\ow(Kɡ ;KL*=RSiƦ b٧Nx¨Oiͩ[٪OP #Mn3W|˰̰,=p 23:;EFֵ"4ƹǹbD)}l|w()8ghUVo0dDFijtwxGHO)*,-y{()TU!"opCRS.nog:j&[34=q()^_dyzYZ&'c]|"hiNOOPQR[  r   , - ; <   /Hi9z(+BC8r^-.7de!!"###$$$C'D'h''(****,+,k,z.{.00;0112j3k335l6n7778888q995::;Z<<<<<<>>X>Y>>?e???'@AAAACCDDlEmE|F}FFGGGGGLHMHJJzJJJK}KK+L,LLLPMQMYMMMNN9PPQ|QkRRSSSSSXTYTTTTUBVCVXXYYYY'ZrZZ1\2\\\4]]^^^j`k`rasa:b;bbbbcccd7d8dy?yzz!{"{z{2|U|||M}}~~0 y9h7?z„sˆ̆ljȉ'(Ɍʌ?ҍ:Bڏ%ʐΑϑْڒ|}”ÔӖԖ_aqrʙ=gtϚКDjkߝ:T̞ݟv.bc٥ڥABxާ"Yw:Qwst*+"wxײزz{YZ +<=op%&./YZBCHI[rsBRxD4kl~,-6RS]kl~%&[\] X:bu%&J[{  hi  Z[}~deJKIJ.45\]+g~@o9tu./?BCstfwBCwxN34|<r 0 z     N   I X      l      M  0uv78uv>aQ&z[`st=>z;w!2EM`abcdefghijk<D 9Qf   5 { |    !!2!z!!!!""$#D###### $$.$/$?$$$$ %5%?%U%\%x%%%%%% &$&>&X&i&&&&&&''X)`**+h+;,},,,,..//1122244O6P6Q6R66778 8I8888888888889!9@9\9h9z99999:::&:g:q:r:{:::::;;(;d;w;x;<<<+>,>g>>>>z???? @3@Y@@@@/ABA{AAAA`BsBBBBBBDDDDDDDDDDDDDDDDDDDDDEEEEEEEEE E E E E EEEEEE F F FFFGG H4I5IIIIIJJ*JDJtJJJ KLLLLLOOPPQQQHSSTTUUVVXXmYnY8[9[0\1\\]]/]@]]]]]2^3^K^^_t__````\aaaaa b7b8bgbcdddWeXeNfOffhhpjqjjkdkkkk&l n nipjpqqssttuuvv?w@wwx:y;yzz{{}}~~~+,\z؁6Hm~ 3<HTX`q׃@AklmnoABCIJĊŊyz{ً)7AVg|ό܌1cs}؍):IWvَ3Ftԏ*5ZuŐϐ ";Kfđ '<LYi}ؒ'3;McqsГܓ$Obsڔ!/@BVbǕӕ =XnҖ 8Ma|җIs٘>Voq˙&LZlǚɚۚ2^u4ClΜߜ I]_xƝם2>_z|̞1Lnß*,D[q|̠#%5Meš2Y|΢Ti|ţףݣ ?a|ڤ/Nkt*G`pצ(<Tmȧߧ #-G[gzԨ2\ )Wmª֪MO[}ʫ "-8I`tǬެ߬     ?m4XR ޸M4RɼbbA.&NQy|#$23PQkl0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000g 0g 0TT0T0T0T0T0T0T0T0Tz 0Tz 0Tz 0Tz 0Tz 0Tz 0Tz 0Tz 0Tz 0T0T0T0T0T0T 0T 0T 0T 0Tg 0TT0m\0m\0m\0m\0m\0m\0m\g 0TT0&`0&`0&`0&`0&`0&`0&`0&`0&`g 0TT0/e0/e0/e0/e0/e0/e0/e0/e0/e0/e0/e0/e0/e0/e0/e0/e0/e0/e0/e0/e 0/e 0/e 0/e0/e0/e0/e0/e0/e0/e0/e0/eg 0TT0v0v0vg 0TT0:x0:x0:xg 0TT0[z0[z0[z0[z! 0[z0[z! 0[z0[z0[z0[z! 0[z0[z! 0[z0[z0[zg 0TT0\0\0\0\0\0\0\g 0TT0000! 0! 0! 0000000g 0g 00g 00Z0Z0Zg 00v0v0v0v0v0v0v0v0v0v0v0v0v0v0v0v0v0v0vg 00*0*! 0*! 0*! 0 *0*0*0*0*0*0*0*! 0 *0*! 0 *0*0*g 005050505050505050505050505g 0g 00Φ0Φ0Φ0Φ0Φ0Φ0Φ0Φ0Φ! 0 Φ! 0 Φ! 0Φ! 0Φ! 0Φ! 0Φ! 0Φ! 0Φ! 0Φ! 0Φ! 0Φ0Φ0Φ0Φ0Φ0Φ0Φ0Φ0Φ0Φ0Φg 0000000000000! 0! 0! 0g 00000000000000g 00g 0000000000000000000! 0! 0! 0! 0! 0! 0! 0 ! 0!! 0"! 0#! 0$! 0%! 0&! 0'g 00*0*0*0*0*0*! 0(*! 0)*! 0**! 0+*! 0,*! 0-*! 0.*! 0/*! 00*! 01*! 02*! 03*! 04*! 05*! 06*! 07*! 08*! 09*! 0:*! 0;*! 0<*0*0*0*0*0*0*0*0*g 000000000000g 00000000g 006g 0 00! 0=H 0H 0H 0H 0H 0H 0H 0H 0H 0H 0 H 0 H 0 ! 0>! 0?! 0@H 0 H 0 H 0H 0! 0A! 0B! 0C! 0D! 0E! 0F! 0G! 0H! 0I! 0J! 0K! 0L000000g 0 0t0t! 0Mt! 0Nt! 0Ot! 0Pt! 0Qt0t0tg 0 0000000g 0 0 0 ! 0R ! 0S ! 0T ! 0U 0 0 g 0 0 0 ! 0V ! 0W ! 0X g 00000000000000000! 0Y! 0Z! 0[! 0\! 0]00g 0g 0000g 00c0c0c0c0c0c0c0c0cg 00!0!0!0!0!g 00&0&0&0&! 0^&! 0_&! 0`&! 0a&! 0b&! 0c&! 0d&! 0e&! 0f&! 0g&0&0&0&0&0&! 0h&! 0i&! 0j&0&0&g 0(j 0^10101! 0k1! 0l1! 0m1! 0n1! 0o1! 0p1! 0q101(j 0^10505! 0r5! 0s5! 0t5! 0u5! 0v5! 0w50505050505050505050505(j 0^10k@0k@! 0xk@! 0yk@! 0zk@! 0{k@! 0|k@0k@0k@0k@0k@0k@(j 0^10G0G0G0G(j 0^10I0I0I0I0I0I0I0I0I0I0I0I0I0I! 0}I! 0~I! 0I0I0I0I0I0I0I0I! 0I! 0I! 0I! 0I! 0I! 0I! 0I0I0I0I! 0I! 0I! 0I! 0I! 0I! 0I! 0I0I0I0I(j 0^10F^0F^0F^0F^0F^0F^0F^0F^(j 0^10c0c0c0c(j 0^10Ff0Ff0Ff0Ff(j 0^10g0g0g0g0g0g0g0g(j 0 ^10{m0{m0{m0{m! 0{m! 0{mI 0{mI 0{mI 0{mI 0{m! 0{m! 0{m! 0{m! 0{m! 0{m! 0{m0{m0{m0{m! 0{m! 0{m! 0{m! 0{m! 0{m! 0{m! 0{m! 0{m! 0{m! 0{m0{m0{mg 00Vy0Vy0Vy0Vy0Vy0Vy0Vy0Vy0Vyg 00f0f0f0f! 0f! 0f0f0f0f0f0f0f0f0f0f0f0f0fg 000p 0q 0q 0q 0q 0q 0q 0q 0q 0q 0q 0 q 0 r 0r 0r 0r 0g 0(k 0S0o0o0o0o0o0os 0os 0os 0os 0os 0os 0o0o(j 0S000000t 0t 0t 0t 0t 0t 0t 0t 0t 0t 0 J 0J 0J 0J 0J 0J 0J 0J 0J 0J 0 u 0u 0v 0v 0v 0v 0v 0v 0v 0v 0v 0v 0 v 0 0(j 0S00w 0w 0 0 0 0 0 00(j 0S0000(j 0S000000(j 0S0׳0׳(j 0S0000(j 0S00000g 0 (l 0>0O0O0O0O0O0O 0O 0O 0O 0O 0O 0O 0O 0O 0O 0 O0O0O0O 0 O 0 O 0 O 0 O 0O 0O0O0O0O0O0O0O0O0O0O0O0O0O0O0O0O(j 0>00 0 0 0 0 0 0 0 0 0 0 0 0 0 00000000(j 0>0=0=0=0=0=0=(j 0>080808g 0 (m 0000000(j 000 0 0 0  0! 0" 0# 0$00000000000(j 000(j 000(j 00000(j 00a0a0a0a(j 00g 0 0e0e 0%e 0&e 0'e 0(e0e0e0e0e0e0e0e0e0e0e0e0e0e0e0e0e0e0eg 0 000000000g 0 0g0g0g0g0g0g0g0g0g0g0g0g0g0g 0g 0g 0g0g0g0g0g0g0g0g0gg 00 0  0)  0*  0+ 0 0 0 0 0 0 0 0 g 0030303g 0g 0!!05g 0!!0w0w0w0w 0,w 0-w 0.w0w0w0w0wg 0!!0g 0!!00000g 0!!0 0 0 0 0 0 0 g 0!!0%0%0%g 0!!0'0' 0/' 00' 01' 02' 03' 04' 05' 06' 07' 08' 09' 0:'g 0!!0,0, 0;, 0<, 0=, 0>, 0?,0,0,g 0!!0.g 0g 0//0000000000000000 0@0 0A0 0B0 0C0 0D0 0E0000000 0F0 0G0g 0//0 ;0 ;0 ;0 ;0 ;0 ;0 ;g 0//0>g 0//0?g 0//0@0@ 0H@ 0I@ 0J@ 0K@ 0L@ 0M@ 0N@0@0@0@ 0O@ 0P@ 0Q@ 0R@ 0S@ 0T@ 0U@ 0V@ 0W@ 0X@ 0Y@ 0Z@ 0[@ 0\@ 0]@ 0^@ 0_@ 0`@ 0a@0@0@0@0@0@ 0b@ 0c@ 0d@0@0@0@0@0@0@g 0//0Og 0//0?Q0?Q 0e?Q 0f?Q 0g?Q 0h?Q 0i?Q 0j?Q 0k?Q 0l?Q 0m?Q 0n?Q 0o?Q 0p?Q 0q?Q 0r?Q 0s?Qg 0//0U0U 0tU 0uU 0vU 0wUg 0//0X0X0Xg 00[g 0[[0`]0`]0`]0`]0`]0`]0`]g 0[[0cg 0[[0dg 0[[0Xf0Xf0Xf0Xf0Xfg 0[[0kg 0[[0lg 0[[0ng 0[[0og 0[[0qg 0 [[0s0s0sg 0g 0uu0u0u 0xu 0yu 0zu 0{u 0|u 0}u 0~u 0u 0u 0u 0u 0u 0u 0u 0u 0u 0ug 0uu0~0~ 0~ 0~ 0~0~0~0~0~0~0~0~0~0~0~g 0uu09090909 09 09 09 09 09 09 09 09 09 090909g 0uu000000000g 0uu0{0{ 0{ 0{ 0{ 0{ 0{ 0{ 0{ 0{0{0{0{0{g 0uu0l0l0lg 0uu00000g 0uu0g 0uu0=0=0=g 0 uu0g 0 uu0Z0Z0Zg 0 uu0ͥg 0 uu040404 04 04 04 04 04 04 04 04 04 0404040404040404040404040404040404 04 04 04 04 04 04 04g 0g 0  0#0#0#g 0  00000g 0  (n 0*030303030303(j 0*0L0L0L0L(j 0*00 0 0 0 0 0 0 0 0 0 000g 0  00000000g 0  00 0 0 0 0 0g 0 0000g 0 0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0l0lg 0 g 000000g 00.g 00vg 00g 00g 00m0mg 000000000000000000000000000000i 00Y0Y0Y0Y80Y 0 0 0 0 0 0 0 0 0 0 0 0 0 0080Y 0' 0' 0' 0' 0' 0' 0' 0' 0' 0' 0' 0' 0' 0' 0' 0' 0' 0'0'80Y 0h 0h 0h0hx0h 0j 0j 0j 0j 0j 0j 0j 0j 0j0j80Y 00i 00V0V0V0V 0V 0V 0V 0V 0V 0V 0V 0V 0V 0V 0V 0V 0V 0V 0V 0V 0V 0V 0V 0V 0V 0V0Vi 0000000 0 0 0 0 0 0 0 0 0  0  0  0  0  0 0 0 0 0 0 0 0 0 0 00i 00 0 0 0  0  0  0  0 0 0 0  0  0  0  0  0 0 0 0 0 0 0  0!  0"  0#  0$  0%  0&  0'  0( 0 0 0  0) 0  0* 0  0+ 0  0, 0  0- 0  0. 0  0/ 0  00 0  01 0  02 0  03 0  04 0 0 0 i 00z#0z#0z#0z#0z#0z#0z#0z#0z#0z#5 0z#5 0z#K 0z#K 0z#K 0z#5 0z#5 0z#5 0z#5 0z#5 0z#5 0z#5 0z#0z#0z#0z#0z#0z#0z#0z#i 00A10A10A10A10A10A10A10A10A18 0A18 0A18 0A18 0A18 0A18 0A18 0A18 0A10A10A10A10A10A180A11 0`71 0`71 0`71 0`71 0`71 0`71 0`71 0`71 0`71 0 `71 0 `71 0 `71 0 `71 0 `71 0`71 0`71 0`71 0`71 0`71 0`71 0`71 0`70`7x0`71 091 0909091 09K 09K 09K 09K 09K 09K 09K 0 9K 0 91 091 091 091 091 091 091 091 0 91 0!909i 00=0=0=0= 05= 06= 07= 08= 09= 0:= 0;=0=0=i 00A0A0A0A' 0A' 0A' 0A' 0A' 0AL 0AL 0AL 0AL 0AL 0AL 0A' 0A' 0A' 0A' 0A' 0 A' 0 A' 0 A' 0 A' 0 A' 0A' 0A' 0A' 0A' 0A' 0A' 0A' 0A' 0A' 0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0Ai 00I0I 0I 0I 0I 0I 0I 0I 0I 0I 0I 0 I 0 I 0 I 0 I 0 I 0I 0I 0I 0I 0I 0I0Ii 0 0WO0WO0WO0WO0WO0WO0WO0WO0WO0WO0WO0WO0WO0WO0WO0WO0WO0WO0WO0WO0WO0WO0WO80WO0[0[0[= 0[= 0[= 0[= 0[= 0[= 0[= 0[= 0[L 0[L 0[L 0[L 0 [L 0 [L 0 [L 0 [L 0 [4 0[= 0[L 0[L 0[L 0[L 0[L 0[L 0[L 0[L 0[L 0[L 0[= 0 [0[80WO0d0d0d= 0 d= 0 d= 0 d= 0 d= 0d0d80WO0i0i0i= 0i= 0i= 0i= 0i= 0i= 0i0i0i0i0i0i0i0i0i0i0i0i0i0i0i0ii 0 0x0x0x0x0x0x0x0x= 0x= 0x= 0x= 0x= 0x= 0x= 0x= 0x= 0x= 0xM 0xM 0xM 0xM 0xM 0x= 0x= 0 x= 0!x= 0"x= 0#x= 0$x= 0%x= 0&x0x0x0x0x0x0x0xi 0 00- 0- 0- 0- 0- 0- 0- 0- 0- 0- 0 00080000> 0> 0> 0> 0> 0> 00800l0l0l> 0l> 0l> 0l> 0 l> 0 l> 0 l> 0 l0l0l0l> 0 l> 0l> 0l> 0l> 0l> 0l0l0l0l800b0b"0b0b0b0b0b0b0b"0b"0b0b0b0bi 0 000000000000000$ 0$ 0$ 0$ 0$ 0$ 0$ 0$ 0$ 00000$ 0 $ 0 $ 0 $ 0 $ 0 $ 0$ 0$ 0$ 0$ 0$ 0$ 000000000000$ 0$ 0$ 0$ 0$ 0$ 0$ 00000$ 0$ 0$ 0$ 0$ 0 $ 0!0000000000000000000000$ 0"$ 0#$ 0$$ 0%0i 0 00000080$ 0&GN 0GN 0GN 0GN 0GN 0GN 0GN 0G$ 0'G$ 0(G$ 0)G$ 0*GN 0GN 0G$ 0+G$ 0,G0G80$ 0-L$ 0.L$ 0/L$ 00L$ 01L$ 02L$ 03L$ 04L$ 05L0L8000. 0. 0. 0N 0 N 0 N 0 N 0 000E 0E 0E 0E 0i 00D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0Di 00e0e0e0e0e0eA 0eA 0eA 0eA 0eA 0eA 0eA 0eA 0eA 0eA 0 eA 0 eA 0 e0e0e0eB 0eB 0eB 0eB 0eB 0eB 0e0e0e0e0e0e0e0e0e0e0e0ei 00000: 0: 0000009 009 09 009 09 009 0000000000000+ 00+ 00+ 000000009 09 09 0000i 00Q 0Q 0Q 0Q 0Q 0Q 0Q 0Q 0Q 0Q 0Q 0Q 0Q 0Q 0Q 0Q 0Q 0Q 0Q i 0000000* 00* 00* 00* 00* 00* 00* 00* 00* 00* 0 0i 00%0%3 0%0%3 0%0%3 0%0%0%0%0%0%0%0%i 00+0+0+0+0+( 0+( 0+( 0+0+x0+( 0$.( 0$.( 0$.( 0$.( 0$.( 0$.0$.i 00V/0V/0V/0V/) 0V/0V/) 0V/0V/) 0V/0V/80V/0303x 0303x 0303x 0303x 0303x 030303x 0303x 0303x 0303x 0303x 0 303x 0 303x 0 303x 0 303) 0303) 0303) 0303i 00D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0D0Di 00Mh0Mh0Mh0Mh0Mh0Mh0Mhy 0Mhy 0Mhy 0Mhy 0Mhy 0Mh0Mh0Mh0Mh0Mh0Mh0Mh0Mh0Mh0Mh0Mh0Mh0Mh0Mh0Mh0Mh0Mh, 0Mh, 0Mh, 0Mh0Mh0Mh0Mh0Mh0Mh0M0Mh0Mh0M0Mh0Mh0M0Mh0Mh0M0Mh0Mh0M0M0M0M0M0M0M0Mh0Mh0M0Mh0Mh0M0Mh0Mh0M0Mh0Mh0M0Mh0Mh0M0Mh0Mh0M0Mh0Mh0M0Mh0Mh0M0Mh0Mh0M0M0M0M< 0M0M< 0M0M< 0M0M< 0M0M< 0M0M< 0M0M< 0M0M< 0M0M< 0M0M< 0 M0M< 0 M0M< 0 M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0M0MF 0MF 0MF 0MF 0MF 0M0M0MG 0MG 0MG 0M0Mi 00On0On0On0On0On0On0On0On0On0On0Oni 00;v0;v0;v0;v0;v0;v 0;v 0;v 0;v 0;v 0;v 0;v 0;v 0;v 0;v 0 ;v 0 ;v0;v0;v0;v 0 ;v 0 ;v 0 ;v 0;v 0;v 0;v 0;v 0;v 0;v0;v0;v0;v80;v 0~ 0~ 0~ 0~ 0~0~80;v 0B 0B 0B 0B 0B 0B 0B 0 B 0!B 0"B0B80;v 0# 0$ 0% 0& 0' 0( 0) 0* 0+ 0, 0- 0. 0/ 00 01080;v 02k0k80;v 03 04 05 06080;v 07 08 09080;v 0:֋ 0;֋ 0<֋ 0=֋ 0>֋ 0?֋ 0@֋ 0A֋0֋80;v 0B 0C 0D 0E 0F080;v 0G  0H  0I  0J 0 80;v 0K' 0L' 0M'0'80;v 0NF0F80;v 0O080;v 0Pے 0Qے0ے80;v 0RA 0SA0A0A0A0A0A 0TA 0UA 0VA 0WA0A0A0A 0A 0A 0A 0A 0A0A0A0A 0A 0A 0A 0A0A0A0A0A0A0A0A0A0A0A0A0A0A; 0A; 0A; 0A; 0AO 0AO 0AO 0AO 0A; 0A; 0A 0A 0AP 0AP 0AP 0A0A0A0A0Ai 00*0*\ 0*\ 0*\ 0*\ 0*\ 0*\ 0*\ 0*\ 0*\ 0*\ 0 *\ 0 *\ 0 *\ 0 *\ 0 *\ 0*\ 0*\ 0*\ 0*\ 0*\ 0*\ 0*\ 0*0*0*0*0*0*\ 0*\ 0*\ 0*\ 0*\ 0*\ 0*\ 0*\ 0*\ 0*\ 0*\ 0 *0*0*0*\ 0!*\ 0"*\ 0#*\ 0$*\ 0%*\ 0&*\ 0'*\ 0(*\ 0)*\ 0**\ 0+*0*0*0*0*0*0*0*0*0*0*i 00000(o 00000] 0] 0Q 0Q 0Q 0Q 0Q 0] 0] 0] 0] 0] 0] 0] 0] 0 ] 0 ] 0 08000] 0 ] 0 ] 0] 0] 00000000(j 000] 0] 0] 0000] 0] 0] 0] 0] 000000] 0] 0] 0] 0] 0] 0] 00(j 00j0j0j0j 0j 0j 0j0j0j0j0j0j(j 00H0H0H0H0H0H0H0H0H0H0H0H0H0H0H0H" 0H0H" 0H0H" 0H0HR 0H0H" 0)H0H" 0)H0HR 0H0H" 0)H0H" 0)H0HR 0H0H" 0)H0H0H0H0H0H0H0H0H0H0H0H0H0H7 0H0H0H0H0H0H(j 000 0 0 0 0 0000 0 0 0 0 0 0 00000000(j 000 0 0 0 0 0000(j 00_0_ 0_ 0_ 0_ 0_ 0_0_0_0_0_0_0_0_0_0_0_7 0_7 0_7 0_7 0_7 0_7 0_7 0_7 0_7 0 _7 0 _7 0 _7 0 _7 0 _7 0_7 0_7 0_0_0_0_0_0_0_0_0_0_0_0_0_ 0_ 0_ 0_ 0_0_0_0_0_0_0_0_(j 000 0 0 0S 0S 0S 0S 0S 0S 0S 0S 0S 0S 0  0S 0 S 0 S 0 S 0 S 0S 0 00000000(j 000(j 0 000000(j 0 00C 0C 0C 0T 0T 0T 0T 0T 0D 0D 0D 0D 00(j 0 0.0.0.0.0.0.0.0.80. 0$0$0$ 0$U 0$U 0$0$80. 0*0*80. 0+,0+, 0+,0+,80. 000080. 010101 01 01 0 1 0 101(j 0 0707 07 07 07 07 07 07 07 07070707(j 0 0<0<0<0< 0< 0< 0< 0< 0< 0< 0< 0<0<(j 00A0A0A0A0A0A0A0A0A0A0A0A 0A0A 0A0A 0A0A 0AV 0AV 0AV 0AV 0AV 0AV 0A0A 0A0A0A0A(j 00QM0QM0QM0QM 0QM 0QM 0QM 0QM 0QM 0QM 0QM 0QM 0QM0QM(j 00S0S 0S 0S 0S 0S 0S0S0S0S0S0S0S0S 0S 0S 0S 0S0S0S0S 0S 0S 0S 0S0S0S0S0S0S0S0S0S0S(j 00b0b 0b 0b 0b0b0b0b0b0b@ 0b@ 0b@ 0b@ 0b@ 0b@ 0b@ 0b@ 0b@ 0b0b(j 00l0l 0l 0l 0l0l0l0l0l0l 0l0l 0l0l 0lW 0lW 0lW 0lW 0lW 0lW 0l0l 0l0l 0l0l 0l0l 0l0l 0l0l 0l0l0l0l7 0l7 0l7 0l7 0l7 0l7 0l7 0l7 0l7 0lW 0lW 0lW 0lW 0 lW 0 lW 0 l7 0l7 0l7 0l7 0l7 0l7 0l7 0 l7 0!l7 0"l7 0#l7 0$l7 0%l7 0&l7 0'l0l0l0l0l0l0l0l0l0l0l0l(j 00000 0 0 0 0 0 0 0 0 0 0  0 0(j 00ϑ0ϑ0ϑ0ϑ(j 00}0}0}0}0}0}0}0}0}0}0} 0} 0} 0} 0} 0} 0} 0} 0} 0} 0 }0}0}0}0}0} 0 } 0 } 0 }0}0}0}0}0} 0 } 0} 0} 0} 0} 0} 0} 0}0}0}0}0}0}0}0}0}0}0}(j 00ڥ0ڥ 0ڥ 0ڥ 0ڥ 0ڥ 0ڥ 0ڥ 0ڥ 0ڥ 0ڥ 0ڥ 0ڥ 0 ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ 0!ڥ 0"ڥ 0#ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ0ڥ(j 00000 0$ 0% 0& 0' 0(000 0) 0* 0+00000000000(j 00I0I0I0I 0,I 0-I 0.I 0/I 00I 01I 02I 03I0I0I0I 04I 05I 06I 07I0I0I0I0I0I0I0I(j 00-0-(j 00S0S0S0S0S0S 08S 09S 0:S0S(j 00000i 00&0&0&0&0&0& 0;& 0<& 0=&0&0&0& 0>& 0?& 0@& 0A& 0B& 0C&0&0&0&0&0&0&0& 0D& 0E& 0F& 0G& 0H& 0I&0&0&i 000000000000000i 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0  0J  0K  0L 0 0 0 0 0 0 0 0  0M  0N  0O  0P  0Q  0R  0S  0T  0U  0V  0W  0X 0 0 0 0 0 0 0 0 0 0 % 0 % 0 % 0 % 0 % 0 % 0 % 0 % 0 % 0 X 0 X 0 X 0 X 0 % 0 0 0 0 0 0 80 0/0/^ 0/^ 0/^ 0/^ 0/0/80 0C0Ci 00f0f 0f 0f 0f0f0f0f0f0f 0f 0f 0f 0f 0fY 0fY 0f4 0fY 0fY 0fY 0f4 0f? 0fY 0fY 0fY 0fY 0f 0f? 0fY 0 fY 0 fY 0 fY 0 f? 0f? 0f 0f? 0fY 0 fY 0fY 0fY 0fY 0fY 0fY 0fY 0fY 0fY 0fY 0fY 0fY 0fY 0f4 0f4 0f0f0fi 0 000000006 06 06 06 06 06 06 06 06 06 0 6 0 6 0 6 0 6 0 6 06 0000i 0!0000002 0Z 0Z 0Z 0Z 0Z 0Z 0Z 02 0Z 0Z 0Z 0 Z 0 2 0Z 0 Z 0 Z 0 2 0Z 0Z 0Z 0000000000000i 0"0<0<0<0<0<2 0<2 0<2 0<2 0<2 0<2 0 <2 0 <2 0 <2 0 <2 0 <2 0<2 0<2 0<2 0<0<0<0<0<2 0<2 0<2 0<2 0<2 0<2 0<2 0<2 0<2 0<2 0<2 0<2 0<2 0<2 0<2 0 <2 0!<2 0"<2 0#<2 0$<0<0<0<0<2 0%<2 0&<2 0'<2 0(<2 0)<2 0*<2 0+<2 0,<2 0-<2 0.<2 0/<2 00<2 01<2 02<2 03<2 04<2 05<2 06<2 07<2 08<0<0<0<0<2 09<2 0:<2 0;<2 0<<2 0=<2 0><2 0?<2 0@<0<0<0<0<0<0<0<0<0<0<80<020202020202i 0#0R60R680R62 0A72 0B72 0C72 0D72 0E72 0F70780R62 0G82 0H82 0I82 0J80880R62 0K82 0L82 0M82 0N82 0O82 0P82 0Q82 0R82 0S82 0T80880R62 0U:2 0V:2 0W:0:80R62 0Xr:2 0Yr:2 0Zr:2 0[r:0r:80R62 0\;2 0];2 0^;0;0;0;i 0$0<0<& 0<& 0<[ 0<[ 0<[ 0<[ 0<[ 0<[ 0<[ 0<[ 0<[ 0<[ 0 <[ 0@& 0<& 0<& 0<& 0<[ 0 <[ 0 <& 0<[ 0 <[ 0<[ 0<& 0<& 0<0i 0%0B00B00B00B00B00B00B00B00B0B00B00B00B0B00B00B00B0B00B00B00B0B00B00B00B0B00B00B00B0B00B00B00B0B0B0B0B0B0B0B0B0B0B0B0B0B0Bi 0&0G0G0G0G/ 0G/ 0G/ 0G/ 0G/ 0G/ 0G/ 0G/ 0G/ 0Gi 0'0J0J0J0J0J 0J0J 0J0J 0J0J 0J[ 0J[ 0J[ 0J0J 0J0J 0J0J 0J0J0J0J0J0J0J0J0J0J0J80J 0] 0]0]80J 0 ] 0 ]0]80J 0 4^ 0 4^ 0 4^[ 04^[ 04^[ 04^04^80J 0` 0`0`80J 0a 0a 0a0a0a0a0a0a0a0a0a0a0a0a0a0a# 0a# 0a# 0a# 0a# 0a# 0ai 0(0k0k0k0k0k0k0k0k0k0k0k0k0k0k0k0k# 0k# 0k# 0k0k0k0k0k0k0k0k0k0ki 0)0000000 00 00 00 00 00 00 00 00 00 00 00 00 000 000 000 000 000 000 000 000 00 00 00 00 00 00 0 0 00[ 0 [ 0[ 0[ 0[ 00 00 0000\>0000000\>000000000b010101010Z0Z0Z0Z0Z0Z0Z0101010101010101010101001010b0101010101010101010010010100b01001010010100101001010010101010Z0Z0Z01010101010101010b01010Z0Z0Z0Z01010101010101010101010b010101010101010Z0Z0Z0101010b0101010101010Z0Z01010Z0Z010101010b01010101010b0101010101010Z0Z0101010101010101010b010101010Z0Z0Z0Z0Z010Z0Z0Z0101010010101010101010b010b01010b01010101010101010101010b010Z0Z010101010Z0Z0Z010Z0Z0Z0Z010101010Z0Z010101010b010Z0Z0Z0Z0Z0Z0Z0101010Z0Z0b010b0101010101010Z0Z01010101010101010b010101010101010101010101010b01010101010101010Z0Z01010101010101010101010101010101010Z0Z0Z0Z0Z0Z0Z0Z0Z010101010101010Z0Z0b01010101010Z0Z0Z0Z0Z0Z0Z0Z0Z0Z01010Z0Z0Z0Z0Z0Z0Z0Z0Z0Z0Z0Z0Z0Z010Z0Z0Z0Z0b010Z0Z0Z0Z0Z0Z0Z0Z0Z0Z0Z0Z0Z0Z010b010Z0Z0Z01010Z0Z0Z0Z0Z0b010Z0Z010101010101010\>000\>00000000000000000000000000000000000000000000000000000^>0T @0@0@0@0@0@0@0@0@0@0p@0@0@0@0@0@0@0@0@0@0@0H@0@0@0@0@0@0@0@0@0@0@0@0@0@00@0@0@0@@0h@0@0@0x 0,@0\~00S@0@0\~00S@0@0\~008T@0\~0 0pT@0 0آ\>0T \0\>0T \0\>0T \0\>0T "0\>0T 0\>0T "0\>0T "0\>0T H0\>0T H0\>0T H"0\>0T "0\>0T "0\>0T "0\>0T "0\>0T X"0\>0T X"0\>0T |3"0\>0T t}"0\>0T t}"0\>0T t}"0\>0T t}"0\>0T t}"00D::::::::::::]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]_______________________________aacccccccccfp ?% !!"#$l%x&Q'K(;)5*H+a,-./01234 67<8}9B:\;I<=8>X?<@ABBCDEFGHIJKLMSNAO?ACDGHJKMNOQRSUWX[^_abcdeghijklmnopqrstuvwyz|~kRov "AXsuvx1346U~E`bce! < > ? A ` {  - H J K M l     & J e g h j    ? i  - H J K M l 8Facdf!A\_`b478:Ys5PSTVu4Upstv &)*,Kt3NQRTs4Pknoq.124Sb} !#B )8SVWYx!"$CQlopr8Wruvx3D_bce (@[^_a+FIJLk9TWXZy!2MPQSr   $ 1 L O P R q !!!!:!`!{!~!!!!!!!!!!"0"3"4"6"U"""""""""###"#G#b#e#f#h########!$<$?$@$B$a$$$$$$$$$$$$%A%\%_%`%b%%%%%%%%#&>&A&B&D&c&&&&&&& '('+','.'M'^'y'|'}''''''''((/(2(3(5(T(((((((())))&)n))))))))))) *#*>*A*B*D*c************+C+^+a+b+d+++++++++,,,,=,Z,u,x,y,{,,,,,,,--4-7-8-:-Y--------....3.[.v.y.z.|......./T/o/r/s/u////////080;0<0>0]00000000111 1(1c1~11111111111222 2"2A2[2v2y2z2|22222223383;3<3>3]3w333333333334/4J4M4N4P4o444444444444505K5N5O5Q5p55555555666696h6666666 777727>7Y7\7]7_7~777777778888=8T8o8r8s8u888888888999999I9d9g9h9j999999999::::;:N:i:l:m:::::;;;$;5;P;S;T;V;u;;;;;;;;<<<<6<N<i<l<m<o<<<<<<<< =%=(=)=+=J=o===========>!><>?>@>B>a>z>>>>>>>>>>> ?8?S?V?W?Y?x????????@ @ @ @,@J@e@h@i@k@@@@@@@@ A(A+A,A.AMAfAAAAAAAAAAA B#B>BABBBDBcBBBBBBBBCCCC=CTCoCrCsCuCCCCCCCCD)D,D-D/DNDfDDDDDDDDDDDE'EBEEEFEHEgEwEEEEEEEEEEEFF-F0F1F3FRFkFFFFFFFFFFFFGG G!G#GBG`G{G~GGGGGGGGGHH8H;HH]HmHHHHHHHHHHHHI I#I$I&IEIPIkInIoIqIIIIIIIIIJJJ J(J?JZJ]J^J`JJJJJJJJJJKKK"K/KJKMKNKPKoKKKKKKKKLLLLMLMgMjMkMmMMMMMMMMM N NNN/NiNNNNNNNNNNNOO/O2O3O5OTOjOOOOOOOOOOOOP)P-P.P0POP\PwP{P|P~PPPPPPPQJQeQiQjQlQQQQQQQQR#R'R(R*RIRfRRRRRRRRRRRS5SPSTSUSWSvSSSSSS 5JZ.8wN zz{,>i~V.m3x]h   ; _     D j z  < M u$v8v8l"GoĘMl';@l Y;`oI n }  n  6 U  < w t,7iGl{-AN9KXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXjq/X2$@=He-Zj. 2$ $x #NX_,& @r$p0 (  P L # A#" EP M # A#" EN 6/ o$* P h Q 3 ,Q"$ ,hB R S D" j)jh S 3 +S"1: +hB T S D"m%mh U 3 *U" f$ % *hB V S D"U ;$U 'h W 3 )W"T [! )hB X S D" Z!Z!h Y 3 (Y"; 8  (h Z 3 'Z"&$% 'h [ 3 &["K d  &h \ 3 %\"K  %h ] 3 $]"L   $hB ^B S D"Z WZ ~h _ 3 #_"$"q& #hB ` S D"[ e[ mnB a c $D" 0 hB b S D"u u IhB c S D"S$'bB d # "d" Ro "bB e # !e")k   !bB f # f"   bB g # g"'o$) bB h # h"'?* bB i # i"P' ) b j # j"# b k # k"#$ bB l # l"6/   hB mB S D"";(b n # n"x ;$ b o # o"F  b p # p"P  B S  ?E FP |$4M 4L 4 _Hlt88728485 _Hlt88728632 _Hlt88728633 _Hlt88728483 _Hlt88728484 _Hlt88728486 _Toc64693903 _Toc64712674 _Toc64778706 _Toc65315551 _Toc65316144 _Toc65316591 _Toc86486887 _Toc88728270 _Toc64693904 _Toc64712675 _Toc64778707 _Toc65315552 _Toc65316145 _Toc65316592 _Toc86486888 _Toc88728271 _Toc64693905 _Toc64712676 _Toc64778708 _Toc65315553 _Toc65316146 _Toc65316593 _Toc86486889 _Toc88728272 _Toc64693906 _Toc64712677 _Toc64778709 _Toc65315554 _Toc65316147 _Toc65316594 _Toc64693910 _Toc64712681 _Toc64778713 _Toc65315558 _Toc65316151 _Toc65316598 _Toc86486890 _Toc88728273 _Toc86486891 _Toc88728274 _Toc64693907 _Toc64712678 _Toc64778710 _Toc65315555 _Toc65316148 _Toc65316595 _Toc86486892 _Toc88728275 _Toc64693908 _Toc64712679 _Toc64778711 _Toc65315556 _Toc65316149 _Toc65316596 _Toc86486893 _Toc88728276 _Toc64693909 _Toc64712680 _Toc64778712 _Toc65315557 _Toc65316150 _Toc65316597 _Toc86486894 _Toc88728277 _Toc86486895 _Toc88728278 _Toc86486896 _Toc88728279 _Toc64693913 _Toc64712683 _Toc64778715 _Toc65315560 _Toc65316153 _Toc65316600 _Toc86486897 _Toc88728280 _Toc64693914 _Toc64712684 _Toc64778716 _Toc65315561 _Toc65316154 _Toc65316601 _Toc86486898 _Toc88728281 _Toc64693915 _Toc64712685 _Toc64778717 _Toc65315562 _Toc65316155 _Toc65316602 _Toc86486899 _Toc88728282 _Toc64693916 _Toc64712686 _Toc64778718 _Toc65315563 _Toc65316156 _Toc65316603 _Toc86486900 _Toc88728283 _Toc86486901 _Toc88728284 _Toc86486902 _Toc88728285 _Toc64693952 _Toc64712709 _Toc64778742 _Toc65315587 _Toc65316180 _Toc65316627 _Toc86486903 _Toc88728286 _Toc64693953 _Toc64693959 _Toc64693956 _Toc64712710 _Toc64778743 _Toc65315588 _Toc65316181 _Toc65316628 _Toc86486904 _Toc88728287 _Toc64712711 _Toc64778744 _Toc65315589 _Toc65316182 _Toc65316629 _Toc86486905 _Toc88728288 _Toc64693960 _Toc64712713 _Toc64778746 _Toc65315591 _Toc65316184 _Toc65316631 _Toc86486906 _Toc88728289 _Toc64712714 _Toc64778747 _Toc65315592 _Toc65316185 _Toc65316632 _Toc86486907 _Toc88728290 _Toc86486908 _Toc88728291 _Toc64712715 _Toc64778748 _Toc65315593 _Toc65316186 _Toc65316633 _Toc86486909 _Toc88728292 _Toc64693954 _Toc64712716 _Toc64778749 _Toc65315594 _Toc65316187 _Toc65316634 _Toc86486910 _Toc88728293 _Toc64693955 _Toc64712717 _Toc64778750 _Toc65315595 _Toc65316188 _Toc65316635 _Toc86486911 _Toc88728294 _Toc64693961 _Toc64712718 _Toc64778751 _Toc65315596 _Toc65316189 _Toc65316636 _Toc86486912 _Toc88728295 _Toc86486913 _Toc88728296 _Toc64693962 _Toc64712719 _Toc64778752 _Toc65315597 _Toc65316190 _Toc65316637 _Toc86486914 _Toc88728297 _Toc64693975 _Toc64712731 _Toc64778764 _Toc65315609 _Toc65316202 _Toc65316649 _Toc86486915 _Toc88728298 _Toc86486916 _Toc88728299 _Toc86486917 _Toc88728300 _Toc64693978 _Toc64712734 _Toc64778767 _Toc65315612 _Toc65316205 _Toc65316652 _Toc86486918 _Toc88728301 _Toc64693963 _Toc64712720 _Toc64778753 _Toc65315598 _Toc65316191 _Toc65316638 _Toc86486919 _Toc88728302 _Toc64693964 _Toc64712721 _Toc64778754 _Toc65315599 _Toc65316192 _Toc65316639 _Toc86486920 _Toc88728303 _Toc64693967 _Toc64712723 _Toc64778756 _Toc65315601 _Toc65316194 _Toc65316641 _Toc86486921 _Toc88728304 _Toc64693968 _Toc64712724 _Toc64778757 _Toc65315602 _Toc65316195 _Toc65316642 _Toc86486922 _Toc88728305 _Toc86486923 _Toc88728306 _Toc86486924 _Toc88728307 _Toc86486925 _Toc88728308 _Toc86486926 _Toc88728309 _Toc64693969 _Toc64712725 _Toc64778758 _Toc65315603 _Toc65316196 _Toc65316643 _Toc86486927 _Toc88728310 _Toc86486928 _Toc88728311 _Toc86486929 _Toc88728312 _Toc86486930 _Toc88728313 _Toc86486931 _Toc88728314 _Toc86486932 _Toc88728315 _Toc86486933 _Toc88728316 _Toc86486934 _Toc88728317 _Toc64693971 _Toc64712727 _Toc64778760 _Toc65315605 _Toc65316198 _Toc65316645 _Toc64693996 _Toc64712749 _Toc64778782 _Toc65315627 _Toc65316220 _Toc65316667 _Toc86486935 _Toc88728318 _Toc86486936 _Toc88728319 _Toc86486937 _Toc88728320 _Toc64693980 _Toc64712736 _Toc64778769 _Toc65315614 _Toc65316207 _Toc65316654 _Toc86486938 _Toc88728321 _Toc64712744 _Toc64778777 _Toc65315622 _Toc65316215 _Toc65316662 _Toc86486939 _Toc88728322 _Toc86486940 _Toc88728323 _Toc86486941 _Toc88728324 _Toc86486942 _Toc88728325 _Toc86486943 _Toc88728326 _Toc64693988 _Toc64693992 _Toc64693993 _Toc64693974 _Toc64712730 _Toc64778763 _Toc65315608 _Toc65316201 _Toc65316648 _Toc86486944 _Toc88728327 _Toc64693995 _Toc64712748 _Toc64778781 _Toc65315626 _Toc65316219 _Toc65316666 _Toc86486945 _Toc88728328 _Toc86486946 _Toc88728329 _Toc86486947 _Toc88728330 _Toc86486948 _Toc88728331 _Toc64693977 _Toc64712733 _Toc64778766 _Toc65315611 _Toc65316204 _Toc65316651 _Toc64693983 _Toc64712739 _Toc64778772 _Toc65315617 _Toc65316210 _Toc65316657 _Toc86486949 _Toc88728332 _Toc64693979 _Toc64712735 _Toc64778768 _Toc65315613 _Toc65316206 _Toc65316653 _Toc64693981 _Toc64712737 _Toc64778770 _Toc65315615 _Toc65316208 _Toc65316655 _Toc86486950 _Toc88728333 _Toc64693984 _Toc64712740 _Toc64778773 _Toc65315618 _Toc65316211 _Toc65316658 _Toc86486951 _Toc88728334 _Toc86486952 _Toc88728335 _Toc64693991 _Toc64712746 _Toc64778779 _Toc65315624 _Toc65316217 _Toc65316664 _Toc86486953 _Toc88728336 _Toc64693990 _Toc64712745 _Toc64778778 _Toc65315623 _Toc65316216 _Toc65316663 _Toc86486954 _Toc88728337 _Toc64693994 _Toc64712747 _Toc64778780 _Toc65315625 _Toc65316218 _Toc65316665 _Toc64693997 _Toc64712750 _Toc64778783 _Toc65315628 _Toc65316221 _Toc65316668 _Toc86486955 _Toc88728338 _Toc86486956 _Toc88728339 _Toc86486957 _Toc88728340 _Toc64693998 _Toc64712751 _Toc64778784 _Toc65315629 _Toc65316222 _Toc65316669 _Toc86486958 _Toc88728341 _Toc86486959 _Toc88728342 _Toc86486960 _Toc88728343 _Toc86486961 _Toc88728344 _Toc86486962 _Toc88728345 _Toc86486963 _Toc88728346 _Toc86486964 _Toc88728347 _Toc64693999 _Toc64712752 _Toc64778785 _Toc65315630 _Toc65316223 _Toc65316670 _Toc86486965 _Toc88728348 _Toc64694000 _Toc64712753 _Toc64778786 _Toc65315631 _Toc65316224 _Toc65316671 _Toc86486966 _Toc88728349 _Toc64694018 _Toc64712780 _Toc64778813 _Toc65315658 _Toc65316251 _Toc65316698 _Toc86486967 _Toc88728350 _Toc86486968 _Toc88728351 _Toc64694019 _Toc64712781 _Toc64778814 _Toc65315659 _Toc65316252 _Toc65316699 _Toc64778818 _Toc65315663 _Toc65316256 _Toc65316703 _Toc86486969 _Toc88728352 _Toc86486970 _Toc88728353 _Toc64694020 _Toc64712782 _Toc64778815 _Toc65315660 _Toc65316253 _Toc65316700 _Toc86486971 _Toc88728354 _Toc64694021 _Toc64712783 _Toc64778816 _Toc65315661 _Toc65316254 _Toc65316701 _Toc86486972 _Toc88728355 _Toc64694022 _Toc64712784 _Toc64694025 _Toc64712787 _Toc64778817 _Toc65315662 _Toc65316255 _Toc65316702 _Toc86486973 _Toc88728356 _Toc64694023 _Toc64712785 _Toc64778820 _Toc65315665 _Toc65316258 _Toc65316705 _Toc86486974 _Toc88728357 _Toc64694027 _Toc64712789 _Toc64778821 _Toc65315666 _Toc65316259 _Toc65316706 _Toc86486975 _Toc88728358 _Toc64694028 _Toc64712790 _Toc64778822 _Toc65315667 _Toc65316260 _Toc65316707 _Toc86486976 _Toc88728359 _Toc86486977 _Toc88728360 _Toc64778823 _Toc65315668 _Toc65316261 _Toc65316708 _Toc86486978 _Toc88728361 _Toc64694029 _Toc64712791 _Toc64778824 _Toc65315669 _Toc65316262 _Toc65316709 _Toc86486979 _Toc88728362 _Toc86486980 _Toc88728363 _Toc64694030 _Toc64712792 _Toc64778825 _Toc65315670 _Toc65316263 _Toc65316710 _Toc86486981 _Toc88728364 _Toc64694031 _Toc64712793 _Toc64778826 _Toc65315671 _Toc65316264 _Toc65316711 _Toc86486982 _Toc88728365 _Toc64694032 _Toc64712794 _Toc64778827 _Toc65315672 _Toc65316265 _Toc65316712 _Toc86486983 _Toc88728366 _Toc64694033 _Toc64712795 _Toc64778828 _Toc65315673 _Toc65316266 _Toc65316713 _Toc86486984 _Toc88728367 _Toc64694034 _Toc64712796 _Toc64778829 _Toc65315674 _Toc65316267 _Toc65316714 _Toc86486985 _Toc88728368 _Toc64694035 _Toc64712797 _Toc64778830 _Toc65315675 _Toc65316268 _Toc65316715 _Toc86486986 _Toc88728369 _Toc64694036 _Toc64712798 _Toc64778831 _Toc65315676 _Toc65316269 _Toc65316716 _Toc86486987 _Toc88728370 _Toc86486988 _Toc88728371 _Toc64694037 _Toc64712799 _Toc64778832 _Toc65315677 _Toc65316270 _Toc65316717 _Toc86486989 _Toc88728372 _Toc64694038 _Toc64712800 _Toc64778833 _Toc65315678 _Toc65316271 _Toc65316718 _Toc86486990 _Toc88728373 _Toc64694039 _Toc64712801 _Toc64778834 _Toc65315679 _Toc65316272 _Toc65316719 _Toc86486991 _Toc88728374 _Toc64694040 _Toc64712802 _Toc64778835 _Toc65315680 _Toc65316273 _Toc65316720 _Toc86486992 _Toc88728375 _Toc64694041 _Toc64712803 _Toc64778836 _Toc65315681 _Toc65316274 _Toc65316721 _Toc86486993 _Toc88728376 _Toc64694042 _Toc64712804 _Toc64778837 _Toc65315682 _Toc65316275 _Toc65316722 _Toc86486994 _Toc88728377 _Toc64694043 _Toc64712805 _Toc64778838 _Toc65315683 _Toc65316276 _Toc65316723 _Toc86486995 _Toc88728378 _Toc64693921 _Toc64712689 _Toc64778721 _Toc65315566 _Toc65316159 _Toc65316606 _Toc86486996 _Toc88728379 _Toc64693922 _Toc64693933 _Toc64693918 _Toc64712690 _Toc64778722 _Toc65315567 _Toc65316160 _Toc65316607 _Toc86486997 _Toc88728380 _Toc64693947 _Toc64712705 _Toc64778738 _Toc65315583 _Toc65316176 _Toc65316623 _Toc64712691 _Toc64778723 _Toc65315568 _Toc65316161 _Toc65316608 _Toc86486998 _Toc88728381 _Toc64712697 _Toc64778729 _Toc65315574 _Toc65316167 _Toc65316614 _Toc86486999 _Toc88728382 _Toc64693927 _Toc64712698 _Toc64778730 _Toc65315575 _Toc65316168 _Toc65316615 _Toc86487000 _Toc88728383 _Toc64693928 _Toc64712699 _Toc64778731 _Toc65315576 _Toc65316169 _Toc65316616 _Toc86487001 _Toc88728384 _Toc64693943 _Toc64712701 _Toc64778733 _Toc65315578 _Toc65316171 _Toc65316618 _Toc86487002 _Toc88728385 _Toc86487003 _Toc88728386 _Toc86487004 _Toc88728387 _Toc64693946 _Toc64712704 _Toc64778737 _Toc65315582 _Toc65316175 _Toc65316622 _Toc86487005 _Toc88728388 _Toc64693948 _Toc64712706 _Toc64778739 _Toc65315584 _Toc65316177 _Toc65316624 _Toc86487006 _Toc88728389 _Toc64693949 _Toc64712708 _Toc64778741 _Toc65315586 _Toc65316179 _Toc65316626 _Toc86487007 _Toc88728390 _Toc86487008 _Toc88728391 _Toc64712693 _Toc64778725 _Toc65315570 _Toc65316163 _Toc65316610 _Toc86487009 _Toc88728392 _Toc64712694 _Toc64778726 _Toc65315571 _Toc65316164 _Toc65316611 _Toc64693938 _Toc64712696 _Toc64778728 _Toc65315573 _Toc65316166 _Toc65316613 _Toc64693937 _Toc64712695 _Toc64778727 _Toc65315572 _Toc65316165 _Toc65316612 _Toc64694044 _Toc64712806 _Toc64778839 _Toc65315684 _Toc65316277 _Toc65316724 _Toc86487010 _Toc88728393 _Toc64694045 _Toc64712807 _Toc64778840 _Toc65315685 _Toc65316278 _Toc65316725 _Toc86487011 _Toc88728394 _Toc86487012 _Toc88728395 _Toc64694046 _Toc64712809 _Toc64778841 _Toc65315686 _Toc65316279 _Toc65316726 _Toc86487013 _Toc88728396 _Toc86487014 _Toc88728397 _Toc86487015 _Toc88728398 _Toc86487016 _Toc88728399 _Toc86487017 _Toc88728400 _Toc64712810 _Toc64778842 _Toc65315687 _Toc65316280 _Toc65316727 _Toc86487018 _Toc88728401 _Toc64778843 _Toc65315688 _Toc65316281 _Toc65316728 _Toc86487019 _Toc88728402 _Toc64694054 _Toc64712818 _Toc64778851 _Toc65315696 _Toc65316289 _Toc65316736 _Toc86487020 _Toc88728403 _Toc86487021 _Toc88728404 _Toc64694049 _Toc64712813 _Toc64778846 _Toc65315691 _Toc65316284 _Toc65316731 _Toc64694052 _Toc64712816 _Toc64778849 _Toc65315694 _Toc65316287 _Toc65316734 _Toc86487022 _Toc88728405 _Toc86487023 _Toc88728406 _Toc64694050 _Toc64712814 _Toc64778847 _Toc65315692 _Toc65316285 _Toc65316732 _Toc86487024 _Toc88728407 _Toc64694055 _Toc64712819 _Toc64778852 _Toc65315697 _Toc65316290 _Toc65316737 _Toc86487025 _Toc88728408 _Toc86487026 _Toc88728409 _Toc86487027 _Toc88728410 _Toc86487028 _Toc88728411 _Toc77633708 _Toc86487030 _Toc88728412 _Toc77633709 _Toc86487031 _Toc88728413 _Toc77633710 _Toc86487032 _Toc88728414 _Toc77633711 _Toc86487033 _Toc88728415 _Toc77633712 _Toc86487034 _Toc88728416 _Toc77633713 _Toc86487035 _Toc88728417 _Toc77633714 _Toc77633707 _Toc86487036 _Toc88728418 _Toc86487037 _Toc88728419 _Toc77633715 _Toc86487038 _Toc88728420 _Toc77633716 _Toc86487039 _Toc88728421 _Toc77633717 _Toc86487040 _Toc88728422 _Toc77633718 _Toc86487041 _Toc88728423 _Toc77633719 _Toc86487042 _Toc88728424 _Toc77633720 _Toc86487043 _Toc88728425 _Hlt77660106 _Hlt77660107 _Toc77633721 _Toc86487044 _Toc88728426 _Toc77633722 _Toc86487045 _Toc88728427 _Toc77633723 _Toc86487046 _Toc88728428 _Hlt77567617 _Hlt77567618 _Toc77633724 _Toc86487047 _Toc88728429 _Toc77633725 _Toc86487048 _Toc88728430 _Toc77633726 _Toc86487049 _Toc88728431 _Toc77633727 _Toc86487050 _Toc88728432 _Toc77633728 _Toc86487051 _Toc88728433 _Toc77633729 _Toc86487052 _Toc88728434 _Toc77633730 _Toc86487053 _Toc88728435 _Toc77633731 _Toc86487054 _Toc88728436 _Toc77633732 _Toc86487055 _Toc88728437 _Hlt71713343 _Hlt71713344 _Toc77633733 _Toc86487056 _Toc88728438 _Toc77633734 _Toc86487057 _Toc88728439 _Toc64694001 _Toc64712754 _Toc64778787 _Toc65315632 _Toc65316225 _Toc65316672 _Toc77483615 _Toc77633735 _Toc86487058 _Toc88728440 _Toc64694002 _Toc64712755 _Toc64778788 _Toc65315633 _Toc65316226 _Toc65316673 _Toc77483616 _Toc77633736 _Toc86487059 _Toc88728441 _Toc64712756 _Toc64778789 _Toc65315634 _Toc65316227 _Toc65316674 _Toc77483617 _Toc77633737 _Toc86487060 _Toc88728442 _Toc64712757 _Toc64778790 _Toc65315635 _Toc65316228 _Toc65316675 _Toc77483618 _Toc77633738 _Toc86487061 _Toc88728443 _Toc64694003 _Toc64712758 _Toc64778791 _Toc65315636 _Toc65316229 _Toc65316676 _Toc77483619 _Toc77633739 _Toc86487062 _Toc88728444 _Toc64712759 _Toc64778792 _Toc65315637 _Toc65316230 _Toc65316677 _Toc77483620 _Toc77633740 _Toc86487063 _Toc88728445 _Toc77483621 _Toc77633741 _Toc86487064 _Toc88728446 _Toc64694004 _Toc64712760 _Toc64778793 _Toc65315638 _Toc65316231 _Toc65316678 _Toc77483622 _Toc77633742 _Toc86487065 _Toc88728447 _Toc77483623 _Toc77633743 _Toc86487066 _Toc88728448 _Toc77483624 _Toc77633744 _Toc86487067 _Toc88728449 _Toc64694005 _Toc64712762 _Toc64778795 _Toc65315640 _Toc65316233 _Toc65316680 _Toc77483625 _Toc77633745 _Toc86487068 _Toc88728450 _Toc64712763 _Toc64778796 _Toc65315641 _Toc65316234 _Toc65316681 _Toc77483626 _Toc77633746 _Toc86487069 _Toc88728451 _Toc64694006 _Toc64712764 _Toc64778797 _Toc65315642 _Toc65316235 _Toc65316682 _Toc77483627 _Toc77633747 _Toc86487070 _Toc88728452 _Toc64712765 _Toc64778798 _Toc65315643 _Toc65316236 _Toc65316683 _Toc77483628 _Toc77633748 _Toc86487071 _Toc88728453 _Toc64712766 _Toc64778799 _Toc65315644 _Toc65316237 _Toc65316684 _Toc77483629 _Toc77633749 _Toc86487072 _Toc88728454 _Toc64694008 _Toc64712767 _Toc64778800 _Toc65315645 _Toc65316238 _Toc65316685 _Toc77483630 _Toc77633750 _Toc86487073 _Toc88728455 _Toc64712768 _Toc64778801 _Toc65315646 _Toc65316239 _Toc65316686 _Toc77483631 _Toc77633751 _Toc86487074 _Toc88728456 _Toc64712769 _Toc64778802 _Toc65315647 _Toc65316240 _Toc65316687 _Toc77483632 _Toc77633752 _Toc86487075 _Toc88728457 _Toc64694009 _Toc64712770 _Toc64778803 _Toc65315648 _Toc65316241 _Toc65316688 _Toc77483633 _Toc77633753 _Toc86487076 _Toc88728458 _Toc64694010 _Toc64712771 _Toc64778804 _Toc65315649 _Toc65316242 _Toc65316689 _Toc77483634 _Toc77633754 _Toc86487077 _Toc88728459 _Toc64694011 _Toc64712772 _Toc64778805 _Toc65315650 _Toc65316243 _Toc65316690 _Toc77483635 _Toc77633755 _Toc86487078 _Toc88728460 _Toc77483636 _Toc77633756 _Toc86487079 _Toc88728461 _Toc64694012 _Toc64712774 _Toc64778807 _Toc65315652 _Toc65316245 _Toc65316692 _Toc77483637 _Toc77633757 _Toc86487080 _Toc88728462 _Toc64694013 _Toc64712775 _Toc64778808 _Toc65315653 _Toc65316246 _Toc65316693 _Toc77483638 _Toc77633758 _Toc86487081 _Toc88728463 _Toc64694014 _Toc64712776 _Toc64778809 _Toc65315654 _Toc65316247 _Toc65316694 _Toc77483639 _Toc77633759 _Toc86487082 _Toc88728464 OLE_LINK2 _Toc64694015 _Toc64712777 _Toc64778810 _Toc65315655 _Toc65316248 _Toc65316695 _Toc77483640 _Toc77633760 _Toc86487083 _Toc88728465 _Toc64694017 _Toc64712779 _Toc64778812 _Toc65315657 _Toc65316250 _Toc65316697 _Toc77483641 _Toc77633761 _Toc86487084 _Toc88728466 _Toc77483643 _Toc77633763 _Toc86487085 _Toc88728467 _Toc77633764 _Toc86487086 _Toc88728468 _Toc77633765 _Toc86487087 _Toc88728469 _Toc77633766 _Toc86487088 _Toc88728470 _Toc77633767 _Toc86487089 _Toc88728471 _Toc77633768 _Toc86487090 _Toc88728472 _Toc77633769 _Toc86487091 _Toc88728473 _Toc77633770 _Toc86487092 _Toc88728474 _Toc77633771 _Toc86487093 _Toc88728475 _Toc77633772 _Toc86487094 _Toc88728476 _Toc77633773 _Toc86487095 _Toc88728477 _Toc86487096 _Toc88728478 _Toc77633774 _Toc86487097 _Toc88728479 _Toc77633775 _Toc86487098 _Toc88728480 _Toc77633776 _Toc86487099 _Toc88728481 _Toc86487100 _Toc88728482 _Hlt77608613:YPYP{S{SSTTTTTTTTTTTTTTTTm\m\m\m\m\m\m\m\&`&`&`&`&`&`&`&`&`&`&`&`&`&`/e/evvvvvvvv:x:x:x:x:x:x:x:x[z[z[z[z[z[z[z[z\\ZZZZZZZZvvvvvvvv**55ΦΦΦΦΦΦΦΦΦΦ*******66666666tttttttt    cccccccc!!!!!!!!&&^1^11155k@k@k@k@k@k@k@k@GGIIF^F^ccFfFfgg{m{mVyVyVyVyVyVyVyVyVyVyVyVyVyVyffSSSSSSSSooooooo||׳׳׳׳׳׳׳׳>>OO==============88888888aaaaaaaaeegg  33!!!!!!""55555555wwwwwwww  %%%%%%%%'''''''',,,,,,,,,,........////////00000000 ; ;>>>>>>????????@@OOOOOOOO?Q?Q?Q?Q?Q?Q?Q?QUUUUUUUUXXXXXXXX[[[[[[[[`]`]`]`]`]`]`]`]ccccccccddXfXfXfXfXfXfXfXfkkkkkkkkllllllllnnnnnnnnooooooooqqqqqqqqssssssssuuuuuuuuuuuuuuuuuuNwNwNwNwNwNw~~~~~~~9999999{{{{{{{{llllllll========ZZZZZZZZͥͥ4444444HHHHHHHHHHHllllll        ########oooooo**33LLkkkkkkmm..vvvvvvvvmmYYVWW     z#{#{#A1B1B1====AAIIIWOXOXOxxxDEEeff{ R R   %%%+++V/W/W/DDDMMMOnPnPn;v?@AHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstu}vwxyz{|~     89:;<=()*+,- !"#$%&'./012345>67OPQRST?@CDEFGHABIJKLMN]^_`abUVWXYZ[\klmnopcdefghij}~qrstuvwxyz{|      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLOPQRSTMNUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~     $ !"#%&'()*+,-./0123456789:;DEFGHI<=>?@ABCJKLMNOPQRSVWXYZ[TU\]^_`abcdefghijklmnopqrswtuvxyz{|}~@@@@@@     0 !"#$%&'()*+,-./123456789P:;<=>?@ABCDEFGHIJKQRSTULMNOVWXYZ[\]^_`abcdefghinopqrsjklmtuvwxyz{|}~@:ZPZP|S|SSTTTTTTTTTTTTTTTT\\\\\\\\D`D`D`D`D`D`D`D`:e:e:e:e:e:eReRevvvvvvvv\x\x\x\x\x\x\x\xzz‹‹‹‹‹‹‹‹ttttttttHH@@ͦͦͦͦͦͦͦͦȯȯ222222226PP      ( (   xxxxxxxx""''m1m1m1m1m1m11111)5)5@@@@@@@@GGJJ`^`^ccLfLfggmmyyyyffffffoỏ̉nnsssssww׳׳׳׳׳׳׳NNaa======CCCCCCCC888888CC          kkkkkkkk;;kkkkkkkk~~  JJ44444444FFFFFF``22!!!!!!!!%%%%%%%%''''''''>,>,>,>,>,>,>,>,.. / / / / / /&/&/00000000B0B0B;B;B;B;B;B;>>>>>>>>@@@@@@@@@@4O4O4O4O4O4OBOBOIQIQIQIQIQIQ]Q]QUUUUUUUU Y Y Y Y Y Y Y Y[[[[[[[[v]v]v]v]v]v]v]v]+c+cddddddddmfmfmfmfmfmfmfmfkkkkkk'k'kllllllllnnnnnnnnooooooooqqqqqqqqssssssssuuuuuuuu v v v v v"v"vwwwwww++IIIIIIIFFFFFFFFlllЙЙGGGGGGGGZZZZZZ||||||||ߥߥGGGGGGGsssssskkkkk߱߱߱߱߱߱"";;o22OOgg222222^^zzzzzzzz555555>>}}}}}}}}{{ooobbb111   ###\1\1\1===AAAJJJbObObO&x&x&xYYY~~~c c c 222%%%+++///DDDMMMinininOvOvOv<<<յյյ!!!!!!!!!!sssssssssNNNNNNNNNNcccccccccc****6666666666888888888<<<<<<<<<AAAAAAAAAAXMXMXMXMXMXMXMXMXMSSSSSSSSSbbbb=e=e=e=e=e=ellllllllllޥޥޥޥޥޥZZZZZZZZZZ5555555555\\\\ZZZvvvCCC666<<<BB H H H K K K%l%l%l~~~HHq\q=q4IqtI>*urn:schemas-microsoft-com:office:smarttags PersonName#urn:schemas:contactstitle'urn:schemas:contacts GivenName urn:schemas:contactsSn 9T\Y  gYFO  [8%%%!\NgzKN]ⳮI_HY1aԖfwb,.z:e gujPWDgxs&gge6p4JSgl h\h \)=i.61i=jbj.p>$8qrv1flEsL F stj9u8%\ur6y^uز| wN-Dx^|)x9myځiym}"4C\}aԠpM~&1:~fphhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o( h^`OJQJo(.^`o(.77^7`o(()^`o(... ^`o( .... ^`o( ..... ^`o( ...... ^`o(....... ^`o(........hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h^`QJo(-h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hh^h`CJOJQJo( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hh^h`CJOJQJo( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(h^`QJo(-h ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h^`QJo(-h^`QJo(-h pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h^`QJo(-h^`QJo(-h pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(hh^h`CJOJQJo( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h^`QJo(-h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h^`QJo(-h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(^`OJPJQJ^Jo(-^`QJo(-hpp^p`CJOJQJo( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o( ^`OJQJo(A.^`o(.77^7`o(()^`o(... ^`o( .... ^`o( ..... ^`o( ...... ^`o(....... ^`o(........hh^h`CJOJQJo( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h^`QJo(-h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h^`CJOJQJo(^`OJPJQJ^Jo(-h pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(^`CJOJQJo( hh^h`OJQJo(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h^`QJo(-h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h^`QJo(-h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h^`QJo(-h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h^`QJo(-h ^`OJ QJ o(ohpp^p`OJPJQJ^Jo(-h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h^`QJo(-h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h^`QJo(-h ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(hhh^h`B*OJQJo(phh 88^8`OJ QJ o(oh^`OJPJQJ^Jo(-h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(  ^ `OJ QJ o(hH^`OJ QJ ^J o(hHo^`OJ QJ o(hHpp^p`OJQJo(hH@ @ ^@ `OJ QJ ^J o(hHo^`OJ QJ o(hH^`OJQJo(hH^`OJ QJ ^J o(hHo^`OJ QJ o(hHhhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(^`CJOJQJo(h^`QJo(-h ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h^`QJo(-h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h^`QJo(-h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o( 7p^7`OJQJo(Annex .^`o(.^`o()^`o(... ^`o( .... ^`o( ..... ^`o( ...... ^`o(....... ^`o(........ h^`OJQJo(.^`o(.77^7`o(()^`o(... ^`o( .... ^`o( ..... ^`o( ...... ^`o(....... ^`o(........hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hh^h`CJOJQJo( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h^`QJo(-h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hh^h`CJOJQJo( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(^`OJQJ h^`QJo(-h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hh^h`CJOJQJo( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o( h^`OJQJo(.^`o(.77^7`o(()^`o(... ^`o( .... ^`o( ..... ^`o( ...... ^`o(....... ^`o(........h^`QJo(-h ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(hhh^h`CJOJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h pp^p`OJQJo(h @ @ ^@ `OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hh^h`CJOJQJo( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hh^h`CJOJQJo( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hhh^h`CJOJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hh^h`CJOJQJo( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(z<0N;Qoiyi`6TsK =j^1'Ub,[Vwb3)G(JC\}&Q 1=ij.p=+| w6y^utHtT<f, C%?B&(Tl h(/myv\ Y1a)x7LK9u5B XAV  f|JS6T7K4XQ<&Q/wW'L&:e g2G8R05JSg@SWh\Y\Y\Y\Y\Y\Ygg&3tgY='nn0c n|c nc nc n`c  Dx'& WDg:~p30{)m}\u%%!\m8@HPppP                *l         *l         :        $         :        :F@ȚBތz<dx@Tp 0        *l         *l         Jzigl!"&GHKqrwHILnos '(,KLPopx!?@Dcdi236EFLnoyXXXYY Y[Y\YeYZZ!Z1Z2Z>ZjZkZuZZZZZZZ[[[F[G[K[[[[&\'\0\\\\\\\]]]c]d]r]]]DDDDDDDDDDDDDDDDDDEEEEEEEEE E E E?4X ޸M4RɼbbA LW_DocTypecNORMAL@i@@Unknown Gz Times New Roman5Symbol3& z ArialI& ??Arial Unicode MS7"UniversC"MS Sans Serif1" Helv5& zaTahoma5HelvDL?5 z Courier New;Wingdings"1hËfËf&i i nnx4d CqH  ?J:ECHO Generic Security Guide for Humanitarian OrganisationsSecurityThe Evaluation Partnershipferaufap                           ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o Oh+'0x$0<P `l    ;ECHO Generic Security Guide for Humanitarian Organisationsn SecurityricThe Evaluation Partnership he he  Normal.dotiferaufa2raMicrosoft Word 10.0@F#@.=נ@!@!GvRsV f;m6  rb. "Systemb$0D b-@"Arial- fb,m6A l(lUD3wf"UfZf" D3)"̽swwjwD9DUJUw{UfA9AJ"911bUwZURDjfJ̔")''') ) '  (('''(&!'""" !"!& ) '#$$&#"$##$$!"''('#$:##&!#$$$!##'$$$$ #$!"$ !$ $##!"$'!!#$##$ '$"(#####""!!##'!$$#!!!'""$&$'"&$!"#####!###!##$$&#''$'!!!!$$!!(%!!#"##&$$$("!#$"'"#$"'$#!!!!"!##$'!&""&$&### (##'$$!"##(#&##$&%'!%'!"&$"$#"!&$##""#"'###&&'!"$$"!"#!#'!&#'!&#"#""  "$"!##$$&!"!####!"&#$ '"#:&'!$$"#:&'! $!"#'$#$#!$"" !!$!!#!$!!##$'"&##!' $"#"#####"!$"!$!$""#!!$"$('('( (           '  '   ' '   ' ( (' '   ''    '(' (  ' ( ('( ( ('999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999 .+-++-++-+.-+-+++-++-++-0-++-+-+-.++-.+-.++-.-/+-++,+-++-+-.-+-++-.+-++-+-+-.+-++-+-+-++-.++-+-.++-.++-++-.-+.+-+-+-+-/-+-.++-.+-.-+-+-.+-++.+-.-+-+-++-.+-.+-++-0-+.-/-.+-+-+.-+.-+-+-++-+.-+-+.-0+-++-/-.+,+-+-.-+-+++-+.+-++.-++-+-+++-++-.+-.+-.+-++++-.+-+-+.-/-.+-+-+-.+-++++-++.+-++-.+-++-+++-+-.-+-.+-/*-+-++--+-.-+-.-.+-+-++-++-0+-/.+-++-.+-+++-+++-/++-.-+-.-+++-.-++++-++-+.+-+-++-++-+-.+-++-+-.*-+-+-.-+-.+-/*-.-+-.+-.+-0++-+.-++-/*-+-.++*-/,-+.-++-/.+-0-+.-+.-+-++-.+-++-+-++-+-.-++-.-+.-/-.+-++++-.+-+-+-.+-/+.-++-.-+-.+-.+-+-+-.++-.-+-.-+.-/++-+-0+*.-+,-+++-+-++-++-.+-++-+.-+-++-.+-.+-++-++-+.-+-++-+-++-.*-+-++-/.+-+.-++-+-.-+-+-0+-.-++-/-++++-.+-+-+-+-.+-+-+-+.+-.-+.-+-+-+-+-+-.-+-++-.+-+-+-++-+.+-++-+.-+-+.-+-.+-++-+.-+-.-+-+++-++-.-++-.+-.+++-++-++-+-+.+-.-+-+-.-+-.+-++-+-.-+-.-+-.-+-/*-++-.-+-++-.-+.-+-+-+-+-.-+-+-++-.+-.++-/+-.+-++-++-.-+++-++-+-+-+-+-.+-++-.-+++-+-,  '+*-++-+-.-+-+-+-++-+-+-+-.-++-+.-+-+.-+++-.+-++-+-+-++-+.-+-++-0++-++-.-+-+.-+++-++-++-.++-++-+-+-++-++-+-.-+*-+-/-++-+-.-+-+.-+.-++-.-+-+-+-+.-++-++-.-+-.-++-/*-+-.+-.-+-/.+-.-+-+-.+-+.-++++-++-+-+-+-+-+-.+-.-++-/,-.+-++-+-+.+-/-++-+-++-++-+.++-++-.-+-+-.++-+.-+-+-.+-+-+-.-+-+-++-+.-++-+++-/.+-+-.+-++-.-++-++-.-+.-+.-++.-+-+-+.+-++-+-+-+.-+-++-.-++-++-.+-.++-++-+-.-+-++-+.+-.++.-++-.+.+-/*-/-+-.--++-.+-.+-+-+-.-+.-+.+-++-+-+-++-+-+-.-.++-  .+-+-.++-.+-++-.+-+.+-+.*+-+-.+-/.+-+-.-/-+-+,-+++-.+-.-+-.-+-+-+-.+-++-+-+-+-.-.+-+.-+-.-+.-+-++.+-/,-/*-++-0*-+-.+-/++-/.+-+-+-++-+-++.-++-+-++-.-++-+++-+.-+-.+.-+-+++-+-+-++-.+-++-+-+-.-+-.+-.++-.+*.-++-/*-/*-.-+++-.+-.+.-+-+-+,-+.+-.++-.+-+-.+-+++.-++-.-++-+.+-/*-/.+-++++-.+-+-+-+.-+-.-+-+-/,-+-.+-++-+-.+-+-++-/+-+-+-+-++.-+-.+-++.+-+-+.+.-++++-.+-++-+-+-.+-+.++-+-.-+-+-+-+--++-++-+-.-++-.+-++,+-++-++-+.++-+-+-+-+-.+-.+.+-.-+.++-++-+-+*-0++-/-++-.+-++-+-+-.+-/-.+-+-+-+-.++-+-++.-/+-.-++-+++-++*.-+.-/+-.+-.+.+-++-++-.-+-++-+-+-.++-+-+-++-.++-+-+.+-+-.-.-+-+-/+.-+.-+.+-+-+.-.++-+-++-.+-.-++-+-+-+-+++-.-+.+-++-+-+-.-++.-+++-++-+-+-++-/-+.-+-.+-.+-+-+-++-+-+-+-+.+-/+-+-+-.-+-+-+-+-+.-+-++-++-.-+-+-.-+.-+-.+-.-++-.+.-++-+.-+-.+-+-+++-+-+.-++-+-.+*-0*--+.-+-.+-+-+*-+-+.-+-.+-+-+-+-.-+-+-.*-/-.+-+-.+-+-+.++-.+-.+-.++.-/,-+-++-.-++-++-/-.+-+-.-+-+-+.*+-+.-++-+-+--++-+-+-.+-+-.*',*-+-+-.+-++-.+-.++-++-+-++-+.+-.-+-+-+.+-+-+--++-+-+-.-+.-/-++-+-.-+-++-+-.+-++-+++-.+-.++-++--.-+.-+-+-.-+-.-+-0++-++-.+-.-+-++-+-+-.+-+-++-.-.+-+-+-++-.-++.+-++-.-+-+-+-.+-.++.-++-+-++-.-+-+.+-.+-+-.+-+-+-+-+-++.-.+-0++-/+.-+-.--.+-++-.++-.+,+-+-+-.+-.+-++-.+-++-+-+-++-+-+-.-+-+-.-/+-++*+-+.+-+-.+-+-+.-+++-/-+-+.++-+.++-.++-/.+-+-+-++-.++-+++-+-.++-/,-++-+.-+-+-.+-+-++-++-++-+-+-+-.+-+++-+-.+-.-++-0++-+.+-.+-/-.+-++-.+-++*.-+.+-++-/.+-+++-.+-++-.-+-+-+-.-++-+.+-/*-/-++++-+.-+-.+-.+*.-+.-++-++-+-.+-.++-++-.-+-++-.+-.-+-++-+-+-.+-.+++-++.-++-.+++-++-+-.+-++-+++-0*-++.-++-.+-+-+-++-.+-+.-+++-.-+-.+-++-.++.-+-+-+-+-++-.+-.-+-.++-+-++-.-++-++.+-.+-++-+-+-+-+-.-+-+*-++++-.+-+-+-++-/-.+-++-.-+-.+-++-.+-.+-.+-+-+.+++-++-++-.-+.-/-.-+-.-++-.+-+-+-.-+-.+-+-+-.+-+-+-+-.-+-.++-.+-+-+-.-.-+++-.-+-+++-0*-/++-++-+-+.-++-.+-+-.*-.++-.-+-.+-+-/*-+-+-+-++-+-+-+-++-+-.-+-.+-/-++-+-.-+-+-/+ +-/*-.+-+-++.-+++-.+-.-+-.-0*-.+-+-.+-+-++-++-/-++-+.-/,-+*-+-+-+-+.-++-.+-+-+-++-.+-+-/.+-+-++-+-.-+-++-/*-+-.+-+-++-.+-.-+-+-+.-/-++-++-+.+-++-++-.+-+-.-++-+-+-.+-++-+-+++.-++-.+-++-++-++-.-+-+.-+++-.-+-+-++-.+-.-++-+.-++-++-0++-+-++-/*.-+.-+-++-.+-/++-++-.+-++-++-++-.++-+-+-.+-.+-++-+-+-++-++-.+-++-.++.-++-++-.+-+-+-+-/.+-+*-++-+-++-+.+-+++-+.-+-++-.-+-+-++-.-.+-/.+-+-.-++-0++-/++-+-++-++-++.-+.+-+.-+.-+-+.+-.+-.+++-+++-.-+.-+-++-.+-+-, (**-.+-+-+.+-+-.-+-+-+++-+-+-+-+-.-++-+-.+-.+-.-+.-++-+-++-0++-++-.+-++-++-/.+-.+-++-0*+-+-++.-++-++-+-.-+-.+-+*-+.+-+-+-+++-.+-+-+-.+-.+-.-+-.+-.+-+-+-++-++-.++.-+-.+-+-.+-+-+.-+-.-+-.+-.+-++-.-+-+-+-++-.+-.+-++-+-+.-++-+.-+.-+-.-+-.*-.-/-++-+-.+-++-+-+-+.-+-.-+-+-.+-+-+-.-+.-++-++-.*-++.-.+-++-/*-0+-+-+--++-.+-++-.++.-+.-+-.-/.+-.+-.-+-+-.-+-++-+-.+-+++-.+-+-+-++-.-+-0++-0*-+-+-+-.-+-.+-0*-+*--+-+-.+-++-+.+-+-++-++-+-.+-+-++-+-.++-++-.++-.+-+-++,-+-+-+++-+.+-+-.+*+-+.*+-++-.++-+-+-+++-+-.-++-.-+-.-+.-/*-+-.-.-+-+-++-.+-+-+-.-+.-+-.-+.-+.++-.-+-0+-.-+-.+-++-.-++-.+-++-+-+-++-++-+-+-0++-+.-+.-+-+--++-+-.+-+-.-++-++-+.-++-++-.+-++++-.+-.+-++-++-.+-0+++-+.-++-++-+-+-0++-/*-+-.+-.++-.-+-0*-.+-+-++-+.-++-+.+-++-++-/+-.-++-/.-+-++-.+-.-++--+.-+++.-++-.+-++-+-++-+-++*-+-+-+++-.+-++-.+-.-/++-0*--++-.+-.+-+-++-+-+-+-++-.+-.-++-++-+-+.-0++.-+-+-+-.-+-+-+.-+-.-+-++-.-+.-+++-0-++-+-+-+*-/.+-/-++-.+-.-+-+-.-++-0-++-/-.+-+-+-.+-.+-.-+++-+.-++-++-++-+-.+-++*+-.+-+-+-+-+-.++-++-+-+*-+-++-+-++*+-+-/++-++-+.-/*-.-++-+.-++.-+.-+.-+.+-+-+-.+-/*-/*-.+*+-.+-+-+++-.+-.-+++-/+-.+-/+-.+-.-++-++-.+-+-+-+-+--.-+-+-.-+-/,-++*-.-+-.++-+-+-+-++-++-.++-.++-.++-+.-+-+-.+-.+-.--++-.-+--++-+-++-+-+-.+++-+.-+-+-+-+-+.-+-.+-.++-0-+-++.-/-++-.+-++-/*+-.-+-0++,-++-++-.+-+-.++-.+-.-++-++*+-0*-0*-+-+--+-++.+-++-+.+-.+-+++-/.+-.-+++-+-.-+-.+-+.+-+. +*-+-.-+.-++-++-.+-++-+-+-.+-.-++-+.+-++-++-+-+-.-++-/*-.+-+.-++-+-0+-/-++-.+.+-.+,+-+-.+-++.-/.+-+-.-++-0-+-.-+-+.-++-+-+++-+-.*-/-+-++-++-+-+-.++-++-+-.+-.++-0-++-+.+-.-++-/++-.-+-+-+-+-+-+-+-+.-+.-+-.-+.-.+-++++-.+-++-.+-++.-/-++-+-+-.+-++-.+-.+-+-+-+-+-+-+-++-+.+-++-+-+-++.+-++-.+*.-+.-.-+.++-+-.-++-+-.+-.+-.-+-+-+-+-+-+-++.-+-+-.+-++-0*-.-+-+-+-+-+-/-+-.+-++-.++-+-++-++-+-.+-0-+-++-+.+-+++.-+-/-+.-++-+-+-+-.-+-+-/++-.-+.-++-+-.-+--.+- .+-++-++-++-.+-++-.+-/.+-++-/*-+-.-+-.+-++-+-.++-.+-+-.+-+-+-+.-++-+-.-+.-++-+-++-/-+-++-.-+-+-+-.+++-.-+-++*+-.-+-+-.+-.-+-.++-/*-0*-+-.+-/+.-+-.-+.-++-+-+-+-+-++-.-+-++-+-.-+-+-.++-.+-+.-++-+.-+-+-+++-++-++-.+-.-++-.+-++-+-+-+-+.-+.+-++-.+-++-+-+-.+-++.-+.+-+.-+-/-.+-+.+-++-+-+.-++-/-++-++-+-+-.+-+-.-+-++-++-+++-.+++-+.-.+-+-+-.+-++-.+-+-++-+.+-.+*+-.+-.++-+.-++-+-.-+.-+.-+.-+-+-++-.-+-+-.+-+-++,-++-+.-+-+.+-++-.+-+-+-+-++-++-.+++-.+++-+*-0*-.+-+-.-+-.+-++-.-+-.+-.-++.-++-++-0+-.+++-+-+-.+-+-++,+-+-+.-++-++-+-+-+-.+-+-/+.-+-+++-+.-++-/-+++-.+-0-++*+-.+-+++-++-+-.-++-+.+-+-.-+-++*+-+-+.-++-++-.+-.-++++-.-+++-+-.++-.-++-.+-+.-++-+++-.-+-.+-++-++-+-++-++-.+-.+-.+-.+-+-+-.+-++-.+-.++-++-.-+-+-+-.-+-.+-++-+-+-.+-.-++-++-.-+.-+*-/+.-++-.+++-.++-.+-+-+-++-.-++-++-.+.-++-.+-+-+-.+-+.-+-++-0-++-+-+-.-+-.-+-+++-+-+-++-+++-.+-++-.+-++-.-+.-/-.-++-/.+-+-.+-++-.++-.+-+-.+-++-+-++-+-0+ ,*-++-+-.++-++-+-.-++-++-+-++-/-++-+.-+-+-+-.-+-.++-.++-.-/-.+-+-+.-.+-.++-.++-+-.*-+-/.+-.-++-++-.-+.-+-+-+-++-0-++-+-.-+.-+-++-.-+-+-.+-++-.+-/-.+-+-+.-.+-++-++-+-.-+++-.-/.+-+-+-.*-/*-++-+.-+-.-+++-++-.+-.+-++.-+.-++-+-+-++-++-++.-++-.+-/+-+-+-.+-/++-/+.-++-++-.-+-+.+-++-/*+-.-+-++-+-+-0*-+-+-+-+-+-++-.-+-.++-.+-+-+.-++-+-+-++-++-0*-++-.-+-+-+.-+-.+-.+-++-/++-++.-+-.++-.+-+-.-++-.+-++-.+-++-+-+-++-.-+-+-++-+-+.-+-.-++-+.+-+-.-+-.+-.-+-* ++-.-+++-+-.+-.++-++-.+-++.-+.-++-.-+-+-.+-+-+++-+-+-+-+-+-++-.+-+-++-+-+-+-+-.++-0*-+-+-+*-.-+-.-+-+-+-.++-+.-+-.+-/*-++-+-+.+-++-.+-++-++-++-.-+*-.+-+-++-.+-.+-+-+-++-.-++-+-+-.++-/+-.+-.-+-++-++-0-+.-+-+-+-.-+-+-+-.-++.-+.-+-0*-/-+-+-+-.-+-.+-++-.-+-.-+-++-.+-++-+.-/-.+-.-/-++-.+-+.+-++-.+-/+.-+++-.+-+-+++-0-++-.+-+-+.-+.+-+-.-+-+-.++-++-++-.+-/*-+-+-/,+-+-.-++-+-.+-+-++-.+-++-.-+-.+-++-.+-0++-.+-++-.+-.+-.+-+-+++-.+-+-+-+++-+.+-+-++++-  +-/++-.-++-+-+-/-.+-+-+-.-+-+-+.-/++-+.*+-0++-.-+-+.+-.+++-.-++-.+-+-++.-+.+-+-+-+-.+.-+.-/++-++-+++.-++-.-++-++-+-.-+.+-++.-/-.+-++-.+-.+-.-+-++-0++-+.+-+-+-++-.++.-+-+-++-.-+++-+-.-.-+-+++-.+-.+-+-++-++-.+-++-++-+.+-+-+-++-+-+-+.-++.+-++-+-++-.+-++-.-++-.+-/*-0*-.+-+-++-+-.-+.-++-.-+-.+-+-0*-+-+.-.-+-.++-.-+-.+-/*-.+-+-+-+-.++-.+-++-0-++-.+-++-+-.++-+.-/-.++-.+-.-++-+-+.-++-.+-++-++-+-.-+-+*-+-/*-.+-++-++-++-.+-+-+-+-++.-+-.-+-+-+-.+-+-. '**-.-+-+.-++-+.-++-.+*+-++-.+-+-+-.-++-/-+-+-+-+.+-/-++-.-++-+-+*-+.+-+-+-+-++.-+-+-+-++-+-.-+.-+.-+-++-++-.-+-.++-++-+-.-+-+-++-.+-+-+-+-++-+.*-+-+-+-+-0++-.-+-+-+-/.+-.+-+++-.-++-+-++-+-.-++-/*-.*-.-+-.++-.+-.+-.-+-++.-+.-++.+-+-+.-/-+.-++,+-/+-.+-++*+-++-.-++-++-+-+-.-++*+-+-++-+*-++-.-++-+.-++-+-+++-/-++-+-+-+-.++-.+-.+-+-+-++-.+-+-.+-++-.+-+-+-+-.*-+-+-+-++-+-.+-/+.-+-+-++-.+-.+-.++-.++-/*-.-++-/*-.-+-.+-++-.+.-++.-+-+++-+.+-++++-.-++ .+-++-++-+.-++-+-.-+-0-++-++-.+-++-+.-+-+.+-/+.-+-+-.+-+-++-+.+-/.-+-.-+.+-.-+-++.+-++-.-++-++-++-+-.+-.+-++-.+-+-.+-.++-++-.+-+-+-.+*+-+.-+.+-/-++-.+.-+-+-/++.-+.-+-+-++-+-.-+-.+-++,+-.++-++-.-++-/++-.+-/-++-++-/++-.-+-++-+-+--.+-+-+-.+-+.-/-.-+-+-.+-/-.--++-+-+-.+-.+*+-.-/-.++-.+-/+.-+++-.-+-+.-+++-.-+-.+-++,+-.+-/-++-++-+.+-++-+-.-++-+-.-++-.++.-++-/*-.++-+.-/+++-.-+-++-.+-+-+-++-+-+-+-+-.-.++-.-+-.++-.+-+-.-++-+-.-+-.+-.-++-+-.-.-+-.+-*-/,-+.-/+-+.-++*+-++-.+-.+-/*-+.-++-+.-+--.-+-++-.-+-+.+-.+-+-+--++-++-+-+++-.+-+-.+-+-+.-+.-+.-+++-+-+-.+-++-/-++-+-/-.+-++-+.+-++-0-++-+-+-+-.+-+-+-+++-.-+--++-+.+-.+-.-++-+++-.+-/-+-+-.+-++-.-+-.-++-+-.+-.+-.-+-+++-.+-0*-.+*+-.+-+-+-++-+-+++-.+-+-.-+++.+-.+-.+-+++-/-++*-++-.-+-.-+-+-+-+++-.-+-.-+-++-++-.+-/-++-+-.+-.+-.-+-.+-.+*-++-+.+-+-+-+-+-+.-+-.++-.-+-+-.-+-++-.+-++-.++-.+-0++-+.+-+-+-+-+*-.+-/-++-+++-.+-+-+++-++-+*-.-+-+++-+-++-+ +*-++-+-.-+-+-.-/-.+-+-+-+-+-.*-+-.-++-+.++*+-+.-++*+-+-+-+-.+-.+++-.+-0++-0-++-.-++-+.++-+-+-+-+-.-/+.-++-+.-+-.+-.-+-++-.+-+-+-.+-+-+.-/.+-+-++-+.+-+-.-++-.+*+-.-+-++-++++-.+-.-+-+-++.-/+-.+-++-++-++-0*-+-+--++-.+-/-++-+-/++-0-++-.+*+-.-++-.--++-++-++-.-+-++-++-+-.-+-.+-0-+-+-++-++-+.-+.-+-++++-++-.+-+.-+-++-.+-+*-+-+-+-++-++-+-/-.+-.-+-+++.-+.-++-+-+-+-+-++-.+-+-.+-++-0+-+-+-++-+-+-.-+-.+++-+.-/++-+-.+-+-.-++-+.+-/-.+-+-0++-.+-.-++.+-++  .+-+-.+*-+.+-++*-++-+.+-.+-.+-/++-++-.-+-+-0-++-++-0-+.-+-++-+++-.-++-+-+-+-++-/++-.-+-+-+-.++-.++-+-+-++-.-/*-++-+++.-+-++-+.+-++-.+-+-+-+-.+,+-.-+-.++-.+-++-0-+++-.+-+-.-+-+-+-++-.+-+-+-+-+-+.-++-.+-+-+++-+.*+-++-.-+.-+-+-.-+-++-++-0-++-.-+++,+-0*-.+-+++-.+-.+-+-++-.-+-+-+.+-+.-+.-++-++-+-.+-+-.+-++-.-+-.+-.-+-.-/.++-.+++-0+-.+*-++-+-++-.-+-++-+.-+++.-++-.+-++-+++-.-+-+-.-++-.+-+-.*-++-++-.-++-+-.-+-++-+.+-/+-.-+-.-++-.+*-+-++-+-+-+-+-.-(*-0++-/-++--++-0-+-+-+-++-++-+-.-+.-+++-+-+-+.-+.-+-++-+.*.-+-.-+-.+-+-.++-.+-.-+-++-.+-.++-+-+-+-.+-.+-.-++-+.+-.-+--+.-+-.-+-.+-+-+.+-+.-++-/-+-+++-+-++-.+-+-.+-+-+-.++-+-.++-+.-++-.+-.+-.+-+-+.-++-+-.-+-.+-/-.+-+-++-+.*+-++-.+-.+-+-+.-+++-+-/-+-++-+-+-+-+-+-+-/.+-++*+-.+-+-.+-++-+.-+.-+.-+-.-++-.+-+++-++-/*-++-+--+-++-.-+-+-+-0-+-+.+-.++-+-.-+-+-.-+-+.-++-+.-+-.-++-.+*+-.+-/*-.++-0++-++-+-+.-+-+*-++,-+-+-+-.-++-++-+-+-0-+-.+-++.+-.+-++*,*-+-.-+.-++.-+-+.+-.+-+-.+-.+-+-+-+-.-+.*+-+-+--++-.-/+-/-+-+++-++-.++-.-++-+-+-.+-++-+-/-.+-.+-++-++-+++-.-+--++-.+++-+.-++-+-.-++-+-++-/*-+-.++-.-+-.+-+-+-+-+-.-+++-+-.++-.-++-+-.-+-++-++-+.+-+-+-.+++-.-+-+-++-+.+-.-+-/-.+-++-+--.+-+-++-.-.+-++-.-++.-+.-++-.+,-+-.+-0-++-.+-+-+-.-+-++-+-+++-++-+-+-.-+-.+-+-.++-+.+*+-.-+-.++-.++-+.+-+-+-+-+.++-.+-+++-.+-++-.+-+++-++-++-/-++-.-++-+-+-.-/.-.+-+-/.+-.+.-/-.+-.++-++-+.-+.-++-.++-.-+-+-++-.+-+  ++-++-++-+.-+-.+-+-++-.++-+-+-.++.-++-++-0-+.-+++.-++-.-+-++.-+-.+-+-+-+-.+-++.+-+-.+-++.-++-++-.*-+.-+-+-++-.++.-++-.-++-++-.++-.+-0*-.-+-.+-++-+-++-++-+.+-+.++-++-.-+-+-+-++-.-++++-++,-+.-+-+-+-.+-+-.-++++-.-.-+-+-++-+.-++-.-+-+.++-.+-.-+-++-.-.++-.-+-+-+.-++-/-+-+-+-++-++-/.+-+++-.+-/.+-/-.+-.+-.-++-++-.-+-+-.-+-0-++-++-+-++--.-+-++-+.-++-/-++-+.-+-+-+-.-+-+-.-+.-+.-+-.+-++-.-+.-++-+--++-.+*-+-/-+-+-++-/*--.+-.+-++-++-+-+-++-.+-+-.-+-0+(+-0*-+.-++-+-++-.+-.-++-+-+.-++-+-++-.+-+-++-+.-+-++-+-+.-+-+-.+-+-.++-++-+-.-+-0++-.-+--++-0*-/+-+-+-.+-.+-++-+-++-+-+.-++-+-+-++-+-+++-++-+-.-+-.+-+.-+-+-.+-+-.+-++-.+++-.+-++-.-+-+.-/-+-++.-+.++-.++-++-.-++++-.+-.+-+-+-+-/++-.+-+-++-+++-++-+++-+-+++-.+++-/*-+-.+*.-++-.-+-+-+-+.-+-+-+-+-.-++-++-++++-.+-++++-.-++-+-++-.+-+-.*-++++-+.-++-/,-+-.+-.+-+-+.+-+++-.++-++-+-+-.-+-.+-++-+-++-++.++-++-0-++-.++-.+-.-++++-+-++-.+-.-++-.+-++-/.++-++-+  **-+.-+-.-+-++-+-+++-+-.-++-++-+-+.-++-+-+.-++-+-.+-.+++-+.+-++-+++-+-.+-/*-++-+-+-++-.+*.-+-+-.-/.+-++-++-.+-+-.+-/.+-+-.-0++-.+-.-+-.-+.-+.++-.++-.+-+.+-++-+-++-.+-++-.-++-0+-++-.-+-+-++.-+-+-+-+-+-+-.-+-++-+-++-++-0*.+-.+-+-++-+-.+-+-.-+.-.-+-+-.+-+-+-.-+-.+-++-/-+.-++-.+*.-++-+-.+-.+-++-+-.+-.+-.-+-.-+-.-++++-+.+-.++-.++-0*+-.-++-/.-+-++-+-+-+-++.-+-.+-+-+-+-.-++.-++++-+-.*-/.+-.-+-+-.-+-+-.+-+-+-++-+-+-.--.+-+-+-++-.+-++-+.-+--+-.+-+-.+-+-+++-.++.-.++-0-+.-++.-++-0+.-+-.-+.+-+-.-+++-+-+-.-+-+-+.-+-.-+.-+-.-.++-.++-.+-++-/-+-.++-+-+-.+-.-+-+-.+-+-.-+-.++-+-+-++-++++-+-+-+--+-++-+-+-+-+-+.-++.-+-+-+.-+-++-+--.+-++*+-+.-+-+-+.+-.-++.-/++-.+-.-.*-0+-+-+--++-.-.*-/-++-.++-++-+-+.+-++-.-+++-+.-+-.+-+-++-+.-++-/-+.-+-++-++-.+-.++-+-+-+-+++-+++-.+-+-.-+-+-/-+-+-+-0-+-+.-+-+-.-+-.+++-.+-/-++-+-.-++.-/++-+-++-.-+++-/*-+-++-.+-+-++.-++-+.+-.+-.+++-++++-.+-.+-+++-+.-++-+.+++-+-.+*  *-/.+-/-++-+-+-+-+-++-++-+-.-+-+-/++-+-+-++-++-0-+.-++-+.+-.-+-++-++-++-++-/-+-+-++-+.-+-.++-+-+.+-++-+-+.+-++-.++-+-+-+-.++-.+-.-+--.+*+-.+++-.-+-.++-.+-+-+-+-/.+-.+-+-+.-+.+++-.+-0-++-++-.+-+-+++-+-+-+-++-+++-/*--++-+++.-+++-/,-.+-+-.-+.-/++-+-.+-++-.-+-+-++-+-+.-.-++-++-.-++-+.++-.+-/*-+-+-+.+-+++-.-+.-+-+-.-++-++-.-.+-.+-+-+++-+-.*-++*.-+-.-++-.-++-.+-++-+-+-.-.+-.-+-+-.-+-.+-.+-++-+.+-+-++-+-+-+-+-+-.-++-.-++-++-.-+-0-+-.-+-+-.-++-+-. '+*-+-.-+.-+-.+-+.-++-.+-.-+++-.-+-.-++.-+.-+.-+-++-+.-+-+-+++-+.-+.-++-.+-+-.++-+.-+-+-++-+-.+-+--.+-0++-+-.+-+-+-++.+-++-+-++-+*-.+++-0-++-.-++-++-+-++-.+-+.-+-+-++-++.-+-+-+-+-+-+-+.-+.-++-0++-.-+.-+.-.+-.-+-+-.++.-+.-+-+-+-+-+++-.++-+*-+-.-.-++-.+-+++-.+++-.++-+++-.-++-++-.-+-+-.-+-.-+-+.-+-+-.-.-++-+-+-.++-++-.+-+++-++*-.++-.-0++-+.+-/-+++-++-+-.+-++-.+-.+-++-++-+++-.++-.+-+-++-+.-+-+-.+-+-.+.-+.+-.++-.+-+-++-.+-++-++-+++-+.-++-+.-++-+ .+-++-++-+++-+++-+.-++-+++-.-++++-++-+-++-+*-/*-.-++-/.+-+-.-++-+-+-.-++-.++-.-++-+.+-+.-+-++-.++++-+-+-.+-+-.++-+.-+-.+-.+-.-+-/++-.-+-++-+-++-.+-.+-.-++-.+-+.+-.+-.-+-++-.+-.-+++-.-+-+-+.-+-+-++-+-++-++-+-++.-++-+-++-+-.+-.+-.-+-+-+-+-0*-++-++-+-+-.+-.-+-.-+-+-.-+-+*-.-.-+++-.+-+-+++-+.++-++.-/++-+-+.+-++-+-.+-++-.-+-+-0-+-+-+-+-+-/-+-.-++-.-+-.++-.-+-++-++-.+-++-+-.-++-+-+-++-.-++-/.+-++-.++-+-+-+-++-+-+-0++-+-+-.+-.+-+-.-++-+.-++-+.-++ *-0*-+.-+-0-+-0-+-+-.-+-.-++-+-.-+.-0*-.-+-0+-.++-.-+-+-.++-+.-+-.++-+-.-+--++-.-+-+-++-+.+-+-+-.-+-+.-++-.++-+-.-+-+-+-+-+++-.+-.-+-+*-.-+-.+-++-++-++-+-++-++-+-+-+++-.+-++-+++-.-++++-+.-+-++-.+-.++-.-+-++.-+-+-.-+-.-+-++-++-+++-.++-+.+-+.+-++-+.+-++-+-+++-+-+.-+-.+-/++-++-.-++-.++-.-++-+-.-+-+-+-++.-+-.+-++-+-.+-+-+.-++-+++-.+*+-+.-.++-.+-+-+.+-+-++-.+-+-.-++-.+-0++-++-+-+.+.-++-.-+-+-.+-+-+-.-++.-++-+-.+*-.-+.+-++-++-.++-+.-+-+-.-++-+.-,*-++-+-.+-++*-+.+-++-++-++-.+-+-+-+-+++-++--+-+-++-.+-+-+-.+-+++-+-.+++-++,+-++-.+-+.-+-+-.+-++-.-++-++-+-+-.-+++-++.+-++-.-++-+-+++-0++-.++-.+-.+-+.-+.+-+-.-+-++.-+-++-.+-+-.-++-+-.-++-+++-.-+-+-+-++-.+-+-+-.++-.+*+-.++-.+-.-+-+-.-+-+-+-/-.+-.-+-.+-.++-0-++,+-++++-.-+-++-/*-.-++-+-+-.-+-+++-.+-.+-+-+-++-+.-++-+-.+++-+.-+-.-++-0-++-+-+-+-.-++-+-+-.+-++-+.-++-+-+-+-+-.+-.+.-+-+-+-++-.+-++-.++-+++-+-+.-.++-/-+-+-+-.-+-.-+-+-++-++.+-+-.-+-+*++-.-.+*-/*-0-+-+-.+-.+-.+-++-++.+-++-.-+.-+.++-.+-++-+.+-++-+-.-++-+-+-.+-/-.+-++-.-+-.+-++-.+-+++-.-+-.++-+++-.-+.-+-.+-+-++-.++-.-+-+-++-+-+-+--++-+-+-.++-+.+-+-+-.+-/*-.++-.+-+.-+-.-+-.-++-+++.-+.-++-.+-++-+-/*-0-++-.-+-++-.+-++-.+-+-.-++-++-+-+-+-+-+-+.-/-+-.-+-++-.+-.-+++-+-.-+.*+-.+-.-++-++-0*+-.+-.+-+.-+.-+-.-+-+-+++-.-+-.+-+++-0++-.+-.+-+++-++-.+-++-+.+-.+-++-+-+-+-++-++.+-++-.+-+-+-.-+-.+-+-+-+-+-.++.-++-++++-+.-+-.-+-+-++++-+.-+ ( +-/++-/-+-.+-+.+-++-+-+-+-.+-.+-+-.+-/*-+-++-+-++-.+-+-+-.+-0++-.+-.+-+-+-+-++-.+-+++-++-.+-++-+-.-++-.+-+-.-+-++-+-+-++-0++-.-+-.-++-.+-.-+-.+-.+*.-/.+-+-+-.-+-.+-+-+-.-++-/-++-++-++++-++-++-.+-+-++-++-/*-/.-+++3++-++-+-+++-.++-.*6++-.+++-+-.+-++.+-++-.+-+-+-.++-+-+.-++-+-+-.-+++-++-/-++-+-++-.+-+-/-++-+-+-+-++-+++-.++-.+--++-+-+-.-.-+-+-++-/+-.+-0-.-+-+-+-.-+-++-.+-.+-++-.+-.+-+-.-+-+-.+-+-++-++-.+-++-.+-+-+-+.-/.-+-++-+.++-.+-.+-.-++-/+( **-.-+-.+-+-+-+-.+-++.+-++-+-+-+-+*-.-/.+-.-+-.-+-+-.++-++-+-+-++-++-.+*+-.+-+-+-.-+-.+-/+-.+-.++-++-++-++-++-.+-++.-+.-+-+-++-++-++-++-+++-++-++-/-+-+-+.+-++-+-+-.++.-+-.-+-+.-+.-++-.-+.-++-++-.-+.-++-.-/,-+-.-+4%+-.-0++-.-+-+-*+%4.-+*-/-.+-+-.+-+-+.-++-.+-++-+-+.+-+-.-+.++-++-.-++-.-+.-/.+-+-+-.-+-.+-/*-.+-+.-+-.-+-.-++-.++-++,+-++-+++-.+-.-+-+-+-+++-++.+-++-++-/*-/+-.+-+-+-+-.-+++-.+-+-/.+*-.+-++-.+-++-.++-0*-+-+-.-.-++-/-++-+-+-+-.-+-,' (.+-++-++-.+-.+-+-+-.-+-.+-+.+-.+.-/*-+-+-+++-++*.-++-.-.-++-.-++-.+-++-0-++-.++-+++-++-.-+-+-+-+-.+-.+-.+-.+-++-.-+-++-+-+-.+-.+-+-.-+-.-+-+.-++-.-+,-+.-+-.+-.+++-+-+-++++-.-+-+-+-.-+-++-+.-.-+-++-+-.-+-+-+-++-++71-++-+-++-+-.+6(1 ++-/,-/*-++-+-+-0+-+.-++-.+-++.-+-.++-++-+-.+-++-.-++-+-+-+-0++-++*.-+-.-.++-.+-+++-+++-++-+-+-.+-/-++-+-.-++-++-++,+-+-+-.+-+-.+-.+-.-+-+-++-.++-.+-++-.-++-++,-+-0-+-.-+-+-.+-+-+-+-+-.+-++++-.-+-.+-0++-.+++-++-'(*-/,-+.-++-++-+.+-++-+-+-.-+-+-+-+-+.+-++-.-+.-/-++-+-+++-.++-.-+-+-.-+-.+-+-+-.-+-.+-++-.+-++.-++-+-+-+-++-.+-/++-.+-+.+.-+-++-.+++-.+*+-.+-+-.-++-/++-+-++-++-.-++.-++-.-++*+-.+-++-+-.-++-+++-.+-0++-.+*+-.++-.+-+12 ++-.+-.+++ 12*+-.-++-+.+-.+-.+-+-+-+-+-+-.-+-+++-/-.+-.-++-.+-++-.-++.-+-+-+-.+-/-++-++-/-++-+-.-+-+-.+-.++.-+-.-+.-.++-.+-+.-+.-/-.+*.-+-.-++-++-+-++.-.+-+-+-++-++-++-+-+.-/-++-+++-++.+-+-.++-.+-+++-.+-+-++-+-+-+-+-++-.-+.-+('+*-++-+-+-.+-.-+-.+-+.++-++-++.-+-.-+-.+-++-+-+-.+-.++-+-+-+-+++-.++-++-+-+.+-+++.-+-.+-++-.+-+-+-.++-++.-+-+-.-+-+-+-+-+-/++-.-+-.-++-/-++-++-++*-.-+-++.-+-.-+-++-+-.-+-++-0-++-.+-+.++-.-+-+-++-+-+-++-0-++-.-+-.-4111)-/+-+-/-4111)+-++-+-.-+-++-++-+-+.+-+.*+-++-+-.-+-++-/++-.-+-.+-+++-+-++.+-.-+-.-+.-+.-+-.+-.++-.+-.+-+-+-+-/++-++-+-+-+-+-+-++-+-++-/-++-++-+-.-+.+-+-++-0++-.+-.+-.+-+.-+-+-+.-+-.-+.-+-.++-+-++-.+-+-+-.-.+-.+*+-.+-.+-+-+*-++'().+-+-.++-++-+++-++-++-+-.+-.-+-++++-++-.-+-.++-++-+-+-.-.+-.+-.-+-+-.+-++.-+-.-+--++-+-.+-++-+-.++-+-.+-+-.+-++-.+-.+-.+-+-.-++-++-++-.-+.-+-+.+-/-++-.-+-++-++-.+-.-+++-+.-+-.+-++-.+-+-++-.+-.+-+-.+-.-+-++-+-+++-.511115.+++32111 /++-.+-++-.+-.+-++.-+-.+-/-.+-0++-+,-+-+-.-+++-++-0*--+.-+-+-++++-+-+-++-++-+-+-/-++-++-++.-+-+-.-++-.++-.++-.+-+-.+-+-.-++-.+-/.+-+-+-+.-+-+-.-++-+-+-+-.+-+++-.+-+-++-+-+-+-/-+-.+-++-.-+++-++-++-0-++-++-.++-/.-+4*-0++-/-.+-+-.-+.-/,-/-++-+++-.*-.-++-+-+++-+-.+-.++-/++-+++-++-++-++-.-+-+-++-.+++-.+-+-.+-+.+-+-.+-+-+-++-+.-++-++-++-.++-++-.+-.-+-++-+-.+-+-.-+.-+++-.+-.+-++-/++-.-/*-/*-+-.+-/+-+-.+-++-/+-.++*-+++-.+-0++-0-++*11111&*+&211212+-.-++-++-+-+-+-.-+-++-+-+-++-+-.-+-/+.-++-+-+-.+-+-+.++-+.+-.+-+-.+*+-.-+-+.+-++-.+-0*-/-+-++.+-+-.-+-/-+-+-++-.+-+-.++-+.-++-.-+-++.-++-+.-++-++-.+-.+-++-+-.-++-++.+-/.+-++*-.++-.-+-+++-.-/+-++-+-++-.+-+-+-.-+-+,*-+-.-++-++-+-+-+-++-.+-+-.-++-+-+.-.++.--.+-+-+-+-.-+-+-.-++-.+-.+-+++-+-.+-++-.-++-.+-+-+-+-+-++-.+-.++-.+-++-.+-+.-+-+-.+-+*-+++-.+-.++-.-++-++-+-.-++-++-.*-.-+-+-+-.+-.++-+-+--.+-+-.+-.-+-+-/-+-.-++-+-+-+-++-04111111)111111)+*+-+-.+-.++-.++-++-.-++.-+.-+-++-.+-+-+.-++.-++-0*-+-+-.+-+-+-.-++-0-++-.+-+-+.-++-+-+.-+.-+-+-++*+-++-.++-.+-++-.++-.-++-+.-++-++-+-+.-++-++-.+-+-+++-.+-.++-.-+-.-+-+-+-.+-0-+--++-.+-0-++-.-/.-0*-.-+--+.-++-+-.+++-++-++-.+-.+++-+-.-++-0++-++-0++-+-+-+-+++-.+-+.-++-.+-++-.-++-+-+-.--.+++-0*-+-/*-/+-.+-.+-+.+-+++-++-.-+-+-.-+-.+-+++-++-0+-.-+-++-+-+-++-.-++-.++-/+-.+-+-++-+-.++.-+-+-+-.+-.+++-++-+-++-.+-+-.++-++-.+-+-.+-+-+711111111111111 ++-.+-+-+-+-++--+.-+++-+-++-+.+*-++-.*-+-+.-+-.-+-+.+-+-+-+-.++-++-+-.+-++-+-.+-+--.+-+-++-+.+-.+-0-+.-+-.-++-.+-++-+-+-.-+--++-+.-.+-+-+.-+-.-+-0++-0-++-+-+-++*+-++-+.+-++-+-+++.+-++-+-.+-++-+-+-+++-+.++-+.-++++-'(+-0*-+.-+-+-+-.-+.++-.-+-+-0+-+-+-.+-++-.-+-++-++-+.-++-0+-++-+-.++.-++++-.-+-+-.+-.+--++-++-+-+-.-/-.+-+-+++-+++-++-+-.-.-+-+-/++-.+-.+-.+-+++-.-+-+-+-.-+-0++-.++-+-+-++-+.-++-++-.-+.-+-.+-++-.++-+-.-+-+-.+*+-+.+-+1111112111112++-+-.++-.+-.+-+.+-++-.-+-.-+-+-0-+-+-/.+-+-+-+++-+-/-.+*.-++-+-.+-0*-+-.+-0++-+-+.++-.+-.-++-+-+-+-++-+++-.-+-+-.+-+-.+++-+.++-.+-++-.+-+-+.*+-++-+-+-++-0++-.+-0-+.-+-+-.+-.++-+-+-+.-+-++-.+-.+-++-.-++-+-.+-+.-+-+**-+.-+-.+-.++-.+-+-++-.+-+-+-.+-++-.+-+++.-+-+.-++-++-+--.+-.+-+-+-++-.-+-+*-.+*-+-+.++-+.-/.+-+-+-++-0++-.-.+-+-.-+++-++-.+-+-.-++-+-+++-.-+-+++-+.-+-++-+-+-+-+-.++-.+-.+-++-.+-+-+*-/++*-.+-+-.-+++-+.+-++-/-.-+-.+4111111111111)+-0++-/-++-++-++-+-.-+-.+++-.+-+-++.-+-+-.+-.+-+-0+,-++-/-++-.+-+-+-+++-+-+-+-.+-+-+-++-++-.-+-++.-+.-+-.-++++-.+-+-.+*-+-.+-+-+-+-+-++-.+-+-/-.+-+-.+-.-+-+-++-+-++-/,+-+-+-+-.-+.-+*-+.+-+-+-++-.+-+-+,-+-++-+-++-.+' .+-+-+++-+++-+-+-+-.+-++-+.+-++-.+-++-.-+--+.-+-+-.-+-.++*+-++-.++-.+-+-+++-0++-/-+.-+-.-+-+-+-.++.-+-+-.-++-+-.-+++-0-++-++-.++-.+-.++-0-++-.+-.-++-++,+-++.-/.+-++-.-+-++-+-.-+-0++-0+-.-/-+-+++-+-.-+-+-.+-.-++-+-+-31111111111117/*-+-+-.+-+.-+.-+-+++-++-.-++-++.-+-+.+-++-++-+.-+-/-+-.-+.-++-++.-+-.-++-.+-++-.++-.+-.+-++-+.-+-++-+++-++-.-++-+++-/-.-++-+-.+-.+-.+-/*-0+*-++-+.+-+++-++-.+-+-.+-+-/-.+*+-.+-++-/.-+-+-.+-+-.-++-.++-+-.+-.-+.-+-+-*-/.+-+-+-.-+-++.-++-+.-+-+-+.-+-+-.-++-.+++-++-.++-.+-+-/-.+-+-+-+-+-.+-.-+-+-+-.+-+++-.++-.+-+-+-+.-++-++-++-++-.-+-.+-.+-+-+-++-+-+-+-++-++-++-.-+.-/-.-+-+-+-+.-+-+++-.-+++-++-+-+--+-+-.++-.-+++-.+++-+-+-++-.+++-%111111111121)-/+-.++-.-+-++-+.+-+-.+-+-++-.+-+-+.-+-.+-+.-++-+-+-.+*-++-+-+.-+-+++-.+-++-++-+-.-+-+-+-+.-++-++-.-+-.-+-.-+-.-+-.-+-+++-+.-++-++-++-+-.-+-0-+-+-+-+-.-+.-++-.++-.*-.-++-0-++-+-.-+-/.+-++-.+*+-+-+-+-0+++-/++-+-.++*(+*-+-.-+.-+-.+-+-+-+-+-++.-++-+-.++-++-++-.-+.-++--++-+-.-++-0++-+.+-++-++-+-.+-++-+-0-+-+-++-.++-.+-++-.+-+.-.+-++-+-+-++-+.+-.-+-+.-+.-+-.+-.+-++-+-+-++-+-+.-+-++++-.-/++-.-+.-+-.**.+*+-+-.-+-.-+-+-.-.++-.+-+*-+3211211121111115.+-+-+++-.+-.-/-.+-+-+.-+-+-+-*++-++-+-++-+.-++++*-/-.+-.+-+-+.+-0-++-.+-+.-0++-+++-.+-+-+.-+.-++-++-.++-++*+-.+-+.-+-.-+-+*-0+-.+-.-+++-+-++.-.+-+-++-+-.-+-+-+-/++-+-+-.+-.++-+-.-+-.*-/*-/-.+-.+-+--+-.-+-0++-.-+.+-++-++-++++-.-++.+-.+-+-+.-+++-+-.+-.+-+-++-++-.++-+.++-+-+-+-.-+-.+-.+-.+*+-/,-++*-+++-.+-+-+-+-+*-0-+-.+-++-.+-.+++-.-+-+-+++-.+-/*-+++-+-/-.+-.++-.+-.+*+-+.+- %*+-+-.-++-+-++++6(*-0-+.+-++++-.-++-+-+-++-.-++!211111111111111111&*+-.-+-+-+-++-++-.+-+-/.+-.++)3*+-0*+-.-+-+-.-+% *-++-++-.-+-+-+-++-+-+-+-+-+-+-.-++-.++-+-+-++-.+-+-+-+.-/-++-++-+++-/.+-0*-+-+-+++-.-+.+-+-++-.++.-+++-+++-.-+-.-++.-++-+-+-.+*+-++-/+-.+-++-++-/.+*.-++-+-+-+-++(*-0*-+.-/+-.-+-.+-+-++-.+-+-+-.-++-+-++-+.+-+-.-++-.-+-+-+.-+.-++-++-+-+-++-/-.-++-0-+-.-++-.++-.++-/*-++-+-+-+-+-++-.-++-.+-+-.-++-+-.+-.-+.*-++-+-+-++-++-0-+-+-.61(-+++-/*-.+-.-+ )+*-++-+-+-.-++++-.++-.+-/++-(11111111111111112111(-*++-.+-++-.-+-++-.+*-+-++-.&!*+-/-++-.+-+*-16.+-+-+-+++.-++-.+-+.+-.+-++-.-++-.-+-+-.++-.+-/*-0++-.+-+-.+-/,-+-.-+-+-+-+++-+.-+-++-+--.+-+-++-/-+-.-+-.-++++-++-+-++-++.-++-/-.+-.-+-+-.+-.+-.-+-/-++-.++-.+-+-,*-++-+-.-+-++++-.-+.-++-.+-++-+.-+.-+-.-+-.++-++-+-.++-.+-++-++-.+-.++-0+-.-+*-+-+-+++-+.-+-+-+-.-.-+.+-+.+-+.+-+.-+-++-++-.++-++-+-+-+-++-/-.+-++.-+.-+.-+-.++-+++123+-.-.++-++-)11 +.-+-.-/.+-+-.-+-+--++-.-+711111111111111111111117*-/+-.+-++-.++-++-0-+-.-+-311-+-.+-++-.+51++-0++-.+-+-+.-++-.-+-++-.+-++++-++++-.+-/-++-.-++-+-++-++-+-+-++-++-.+-+-+-.-++-+.-+-+.+*+-.+-.-+-.++-.+++-+-.-+.-.+-+-.-+-++-.-++-+*-.+-+-+-+-++-++-.+-+-+-++-.+* ++-.-.+*-.+-+-.-+-++-+--++-+.-++-++-++-++-+-+-.+-.++-+-+-+-.-+.-++-+-+-+-+-++-/.+-.+-.-++-+++-.+-++-+-+-+-+-.+-+-+-/*-.-.+-+-+-.+-.+.+-++.-+-++-.-+-+-+-+-++-+-.-+-.&111%*+*-/-++3212+-++-++*-+-+++-+-0++*.-+++411121111111111111111111111%-.-++-.+-++-.-+-+-.+++-++-116++-.*-+*%111&,-+-.-++-.-++-+-+-++-+.-/*-.+-.-+--.-++-+-.+-+*-.-+-.+-.+-.+-.+-+.+-++-.++.-+-.-++-+.+-+-0-++-++-+-+-+-+-+-.++-++-++-.+-++-+.-++-.-+-/++-.++-.+-+-.+-++-.++-.+-++-0'+-/++-/-++-.++-+++-.-++.+-.+-+.-/.-+.-.+-.++-+-+-+-+-+.-++*+-+-++-0++-.+-++,-+-+-++-++-.-+-.-++-++-++.-+.+-++-+-.+*-0++-+-+.+-+-+-+-+-.+-+-.+-+-+++-+.-++-.-+++-/.+--11116*+-++&2111)++-+.+-/-.+-.-+.*-+-/-+.621111121121111111111112111115+-.-+-.+-+-+.+-++-+-.+-+41111%++-++-(11116++-+-.+-+++-.+-.+++-0*-+-+-+-+-0++++-+-.+-+-.-/++-++-+-+-++-++-.-/-.-+-+-+-++*+-.-++-+-++-++-.+-++,+-+-+.-+-.-+-.-+-++-.+-.-+-+-+++-.-.-+-+-++-.++-+-.-+-+-++-.-+*-**-.-+-.+-+-+-+-.-++-.-+-++-+-+-+-/+-++-+-+-.+++-.+-.+-+.-/-.+-+-+-+-++-+.-/-.+-.+-.-+++-++-++-.+-.-+-+-+-.+-.++-0-+-+-/+.-+-++.+-++-++-+-++-.++-.-++-+.-+++-.-+-+-++11117*/-11111 +-.-+-.-++-/*+-/-+-.-++-677777777777111111(777777777573/++-++-+-.+-+-.+-.-+*-0+711111(-++71111+.-+++-+-.-+-+-++-.-+-++-.+.+-++-.-+-.++-+++-++-+-.+-+++-.+-.-+-++-+++-++.-++-0-++-.-+-.+-+-.-+-.+-/-.+.+-+++-+++-+.-+-++-+++-++.-+-+++-+++-.+-+-+-.+-+-.+-.-+-++-/*' .+-++-++-+.+-.++-++-+++-.+-.*-+.-+-.-+-++.-++-.-++-++-++-+-++-.+-.+-0*-0*-+-++-+-+-++-.-+.-/,-/-+-+++-.++-+-+-+-+-++-+.-+-++-.-+-.+-+.-+.+-+-+-.-+-.-++-+-.-++-.+-++-&111111)3111112++++-++-++-.-+-+-+.*+-.-+-+-.+-++-++- 111111&+.-/*-++-.-+-+-.+-+-++-.+-+-+++-0*--+1111134111111!+-+-.-++-++-.+-.-+-++-.-++-+-.+-+-+-++--.-+-.+-.-++-.-.-++-+++-.+-+-.-+.-+-.-+-++-++-.++-.+-++-++-.-++-+-+-.-+-.-++-+.-+-+-.-+.-+-.+-.-+-.-++-.++-++-.+++-+++-.+-.-+ *-/,-+.-+-+-+-+-.+-.+-+-+-+-/.+-+++-+.-+-+-.-+-++-.+-+-.+-.+-++-++-+-++-++-.+-.++-.+-/*-+-+-+*-/.+-.-++--.+-+-+.-+.-++-+-.+-+++-+-.-+-+-+-.+-++-++++-.-+++-+.-++-.+-.-11111111111111)+-.-++-.+-+-+.+-.+-/-++-.+-++-.+-/*-/*211111-+-+-+.+-++-.+-++-.++.-/*-+++-.-+-++++4111111111211116.+++-+.-+.-+*-+++-+.-++-+-.-++-++.+-.-+++-.-+-+-.+-+++-++-.-+-++-.++-++-+-++.-++-.+-++-+-+-++-+.-+*-+-.-/++-+++-+.-++-/.+-++-+-+-++-+-+++-.+-+-+-.+-++-+-+-.-++-/*-.(+*-++-+-.++-+.-++-/+-.-++-+.-+-+-.-++-++.-/++-.+-+--.+-+-++-0+-.+-+-.-+-+-++-+-+-++-.-+.+-+.-/,-+-++-+-.++-.+++-/*-+.-+-++-.-+-0++-.+-+.-++-.+-.+-+-+++-.-++-+-.-+-++-1111111111111 ++-+-.-+-.++-+-++-+-.+-++-.+-/+-.-+.-+)1111+-++.-/-.+-++-.-+-+-+-+-.+-.-+-++-+-.-31111121111121*+-.-++-++-/.-+-.-++-++-.+-++-.-+-+-/++-.-++++-+++-+-0-+-.-++-.+-+-+-+.-/++-+-+.-++-.+-+-.++.-.+-+-/.+-++-.-+-.-+-+-.-+-+-+.-+.+-.+-.++-0-++-.+-++-.-+-.-.++-++-.-++*.+-+-.++-.-++-++-.-+-++.-++-+-.++-.+-.-+-+-+-++-0++++-.+-.-+-+-+-.+++-.+-.+-++.-+.-+-+-+-++-+-+++-.-+++-+-++-.-+-.+-+-+.+-+++-+-+-++-++-++-++-+-+.-+.-+-+-.-++++-+-.-+&1111111112112++-+.++-++-.-+-.+-++-+-0+-+-0*--++-+-+.&1111&.+-+-+-++-.+-+++.-+.-+-+-+-++-.+-+.-+-+111111111111&+-+-.+-+-.-+-/+++-.-+.-++-++-++-.+-+-.-++-+-.-+.-+-.+-+++-++-++-.+-.-+-+-.-.+-+-+-.-+-.-++-+-+-+-+.-+-++-+-.++-+.++-++*.-++-+-+-++-+-+-+-++-++-+.-++++-++-+-+.-++-.-+*-0++-+-++-.-+.-/*-.+-+-+.-+++-+-++-+++-.-+.-+-+-+-.-++-+++-+-.+-+-.-++-++-.-+-++-++.+-.+-.-+.-+-/*+-.-++-.-+-++-+-+.+-+-/-.-.+*-.+-+-.-+-.+-/+.-+-+-+-.+*+-.-+-.+++-+-1111111111114.+-+-+-.+-++-.-+-+.-.+*-.-++-.+++-.+-+--1111-+-.+-.-+-+-.-+-+-++-++.+-++.-++-.+-++++)1111111111116.++-+-.+-++-.--.-++-+-+-.-+-.+-++-.++-++-.++-++-+-++-+-.-+.-+.-++-++++-.+-++-.+-++-++-+++-.-++-+.*-+-+.-.++-.-+-+--.+-/-+.-+.-++-+-+.+-+.-+-.-++-+--.-++-+-.+-+.-++-+,*-+-+-.+-++-+-+-+++-+.-+-+-.-+-.+-+-.-++*+-+.+-.-+-++-+-.-+.*+-+++-++-.+-/++-+.-++-+-++-+++-+-.*-0-++-.-+++-.+-.+-+-+-.+-+++-/-++-.++-+.-+-.-+-+-+.+-++-0-+-.-++-.-++311111111111)+-.+-+-+-.+-++++-+-++-/-++-+-+-.-++-.++-11(+-++-+++.-++-.+.-+.-+.-+-.+-+-+-++-+-.-+%1111111211115++-.++-.++-+++++-+-.++-+++.-+-.+-+-+-+.-+-.-+-.*-.+-.++-++-+-+-+-.+-.-++-++-++-+.-+.-+.-+-++-.++-/-++-+-+-+-++-.+++*-.-++-/+-+.-+.+-+-++-+.+-+-.-+.++-.-0++-++--++-.+('++-.+-++-+.-++.-+-.-++-++-.+-+-++-.++-++-0-+-+-++++-.-.++-++-/-+-.-+-.-+-.-+-.+-+-.-+-+-+-.-+++-/*-++-+++-+-++-++-.++-++-.-+-+-.+-+-+-.+-+++-+-++.-+-+.-+-++++-+-+-++!21111111111111-+-.+++-+-.+-.-+.-+-+-.+-.+-++-.+-+-.-+&11&,-+-+.-+-++-++--+-+-+-+-++-+-.+-.-++++-(11111111111111%+++--+-+-.-+-.-+.+-+-.+-+-++-+-++.-++-+++-+++-/++-+-+-.+-+.+-.+-+-+-+-.-+-.+-0*-/*-/*-/-.+-+-+-.-+.-.+-++-.+-++-.-/-++-.-+-.+-+-+-.*-.-+-+-++++-+-+-++*-+-.-+.++-++- (+-/*-+.-/+-+-+-+.+-+.-+.-++-++.+-+-+-.+-+-+.+-.+-.-++-+-+-.-+-.+-++-++++-++-+-+-++-.+,+-.+-+-.-+-0+-.+-.-+-.+-.+-+-+-.+-++-.+-++-+.+-++-+-.-+.+-+-++-+-+*-+-.-+.-++-11111111111111112 *+-.-++-+-+-++-+.+-++-++-.+-++-++-+-+-116+.+-+-+-.+-.+-+++.-++-.+-.-+++-++-.-+ 21111111111111111(6*++.-+-++-+-+*-+-+-+-.-+,-++.-+-+.-+-.-+-.-+-.-++-+-+-.-+-++-++.-++*+-.+-++-++-.+-.+-++-+.-++-++-++-.+-++-.+-+-+-.+-+++-++-+-.++-/++-.+-.+-.-+++-.+-/-++-+--+-.+-+**-+.-+-.-+-.+-+-+-+-+-+-+-.+-+-.-++-+-.+-+-+-+-+-++-++.-+++-++-.+-.+-.-+.-+.+-+.-++-/-++-/++-.-+-+-+-++-.+-+-+-+.+-/+-.+-++-.+-.-/-.+-.++-/*--.+-.-+.+-0+.-+-+-++721111111111111111111)-*-+.-+.+-+.-+-+-.+-.+-+-+-.-+.-+.++-+-+-.+-++-+-+-.+-+-+.-++-+++-0-+.-++-4111111111111111111127*+-++.+-.++-0+-.++.-++-/+-+-+-.+-+-++-++-+-+-+.-.+*+-++-.+-+-+-+.-/-++-+-.-+-+-+-+-+.-++-++-.+-++-/+-.+-+-+-.+*+-+-.--.+-/.+-/-+-.-++-++-+-+.-+-+-.-+.-/+.++-+-.+(.+-+-++*-+.++-+.+-+.+-.+++-+-.-+++-.++-+-+.+-+.+-.+-.-+-+-+-.+-++-+-+-+-+-+-+-++-/*-+-.+-+-.-++*+-++-.+-++-/++-.-+-.-+-+-.+-++-+++-++-+-+-+-.+++-+++-+-+-+-/+++.+411111111111111111111116*+-+-/-++-+.+-+-+-+-.++-++-+-++-+-+%&+.-++-.+-.++-++-.-++-+.-+-.-+-++-++31111111111112111111111)-+.-+-+-+-+--++-+-++-+--.+-++-+-+.+-+.-++.+-+-++-0-++-++-.+.-++-+-.+-/,-++-.+-++-.-+-.-+.-++-.+-.-+-+-0++-++-0-+.-++*+-+-+-+-+,-++-.-+-.+-+-+-.++-++-+-+-+-.+-+-*-0++-0-++-+-.-+-+-+-++-.-++-++-.-+-+-++.-+-+-+-++-+++-.++.-+-.+-/+.-++.+-+.-+.-+-.+-+*-.++-++-0-+.-++-0*-+-.-/++-++-+.-++-+-.-+-.-+-++.-+.-+-+-.+-.-+.-+-+-.-+61111111111111111111111111%*+*.-+.-+-+-.+*+-++-+-.+-.+-.-+-.+36+-++-++-+-+-.+-++-.-++-/++-.++-.-+!11111111111111111111111115*+-.++-.++.+-+-.+-0+.*+-.+-.++-/-++-+.-+-+.-+-+-.+-.+-+-+-+.-+.-+-+-+++-++-.+-++*+-++-+-.-+--++-.+-+-+-.+-+-++-++-0-+.-+-+.-/++-+++-++-.+-.+-+-+.-++-.+-/*-.+++*-+-+-+.-+-+++-+.+-/*-/-.+-++-++-.+-.+-+-+-.+-+.-+-.-+-+--++-+-.-+-++-+-++-++-+.-+-0+-+-+-+.-+-++-+.-+-.+-++*-.-++-.+-++-.+-++-+-+.+-/-++-++-.-+-+-++-++,+-++&2111111111111111111111111111(6+-+-+-.+-++-0-+.-++-+-++-/*-++-+-.+-+-.+-/+.-++-.+-++-.-+-.-+-+-++-1111111111111111111111111111!++-+-+-+-+-0+-+-+-+-/-++-+-+-.-+.-+-++-++-+.-++-+-/-.+-+-+-+-+++-.+-.-+.-++-.+-/-.+-+-++-++,+-++-+.+-++-0*-.-+.-+-++-+.*+-+-+-0-+-.+-++-++-++-+-+.-++-.-++-+-('.+-+.-++-/,+-+-.-+-.-+.-++-.+-.+-++-++-+-+.++-0*-+++-++-.+*.-+.-++-.+-.-+.-+.-++-++-+-/.+-.+-/*-.-++-++-+-.+-/-+-.-++-+-.-+-.+-.++-+-.-++-.+-++++-+.+-.+-/-++7%%%%%%%%%%%1111111%%%%%%%%%%%%++-.+++-0*-+-++-+.-.++-0*-++.-++-+-+.-+-.-+-+.-+-.++-++-++-+++-.+- %%%%%4%%%%%2111111(%%%%%%%%%%%3-+.-+.-+-+*-0++-.-+-.+-.+-.-++-+-0+-.+-.++-++-++.-++-.+*.-++-.-++-++-+-+.-++-.-++-/.++-+.-/-.+-+-+-.+-+-+++-+-++-.-++-/-.-+.*-+.-+-.+-.+-+.-.+-+-+.-+-.-+-+, '*-/*-+.-+-/-.-+++-++-+-++-+-.-+-0*-/-.-+.+-+-+-++-0-+.-++-/-++-++-++-+-++-+-+-.-++-.+-+-+-+-+-.++-.-++-.+-+-.-++++-+-.+++-+++-++-.-++-+.-++-.+-.-++-+-+-.-+.-/*--.+--.+-+5111111+-+.-.+-.+-++-++-+-+-.+-+.-+-+*-/-+-+.-/-+.-++.-+++-++-+-+-++-0-+.-+.-+.-+-+-.-++-+.++-+-+)1111113/-++-.+-.+-+++-++-+.+-0*-+-++*+-+-++-++++-+.*-+-+-+-+-+-.-+-+-+-++-/-+.-/*-+-.-+.+-+-+-.-+-+-.-+-.-+-+-++-+.+-++-.-+-.-+++-.++-.-+-+++-/-+-+++-+-+-.-+-++-.+-+-++++-+.-+,*-.+-+-.*-/++-.-++-.+-+-.++-+++-+.-+++-+-+-.+-+-+-++-++-.-++-.+-.-+-+.+-++.-++-.-++-.+-+-.+-+-+-/*-.-++-.++-.+-.-+.-+-+-.+-+-.-+-+.-+-+-+-+-+-+-.-+-+++-++-+-+.++-+++-.++11111&+.-+-+-++-.+-0*-/-.+-+-.+-+.+-/*-0*-+-+-.+-+-+-+-.-+.-++.+-+-+-++-++-+-+-.-++-+.-+-+-+-+.- 11111+-.+-++-++-+-.-+.-+-+-+-++-.+-/-.+-+-.+-+-.-/-+-.+-.+-+.*+-.+-+.-+-.-++-+-.++-++-+-.+-++-++*.-++-+-+++-.+-.-+-.+-++++-++-.-+-+-++-.+-.-+-+.+-/-.+++-++-.+-+-.++-.-+-.+-/+++-+-.++-0*-+-++-.-++-.++-/-.+-+-+-++-.-+.-++-.+-.-+-+.-++-.-++-/*-.+-+-.-+-++-++-+-++-+.*+-.++-.-+++-+-+-+-++-+-++-++-.-+-.-+++-.+-+.+-.+-.+-.+++-.+-.-++-.+-+-+-.+-+-+-+%11111--+++-++-.-+-+-+.-++-++-+-+-/-.-++-+.+-++-+-+.+-++-+-+-.-+-.+-.-+-+.-+++-+++.-/*-/.+-+-.+-++21111)++-+-.-+-.+-++-+-++.-+-.-+-+-.-++-.+-+-.-+-+-++++-++-.+-/-++-.+-+.+-+.-+-+-+-+.-+-++-.+-+.-/-++-+.+-.-++-+++-+-.-+-.-+.-++-++-.+-++-/*-+.-+-.-++-.-++-++-.++-.-+++-++-+-*(+-0++-+-+-+.-.+-++-.-+-.-+-++-.-+.-+-+-++-++-++-++*.-+-+-.++-+-+-.++-++-++-.+-.+-.+-.-++-/-+-+-+++-.-++.+-+-.-+-+.-++-++++-++-.-++-+-+-++-++-++-0-++-++-.-++-.+-+-+-.-/.+-31111++-.-+.-+++-.+-+-++-.+-.++-.-++-.-+-+-.+-.++-+-.+-++.+-++-++-++*.-+-+-.-.+-+-+-.+-+-0++-+-+-)1111 +-+.+-+++-+.+-++.-+-++++-+.*+-.+-++-.++-.+*+-.-.-+-+-+-+-.+-++-+-+-++-++.+-+.-+-.++-++-/*-+-.+-.-+-++-+-.-+-.++-.++-++-+-+.+-/*-.*-/-.++-+++-.+-+-.+-.+-+-+-+-++-.-+-+.+- '**-+-+-.+-+-++-.+-+++-++-.+-+-+++-+.+-.+-.+-.+-.+-/-++-++-+-+.-++-/-.+-+.-++-++-++-++-.-+-+.+-.-+-+-+.-+-.+++-.++-+.-.+-.-+.-++-+-.++-.+-.+-/*-+-++-.+-++-.-++-.+*+-++-+-+-111 +-+*-+-+-+-++-.+-.-++-+-+-+++-.++-.+-+-+-+-.-++-.-+-+-++-.+-.+-/-++-.+-++-0-+.-+-+-+-+-+.-+.&1112++.-+-+-.-+-+-.-+-++-.-+-++-/-++-+.-+-/-++-0-+++-/.+-.+-++-+-.-++.-+-.-+-+-.+-/++-0-+.-+-.+-++-+++-+.-+.-++-+-+-++--+-.-+.-+-.-++-/,-+-.-+-0-+-.-++-+-+-++-+.-+.-+-.++-+-..+-.+-++-+.-+-++-.-+-.+-++-+.+-.-+-+-++-+-+-+-++-.-+.-+.-+-.+-+.-+-++-.+-/+-.-+-.-+.-++-.+-+-+++-.+-+-+-++-+-++-+-+-+-+-+-+-++-.++-.-++-/+-.-.+-+-.-+-.+-++-+-++-0-+.-+-++.41116+.-/.+-.+-.+-++-++-+-+.+-.-+-+-+-++-.+*+-++-.+-+++-.+-.-++-+*-0-+.-++-/*-+-++-++-.+*+-.+-++-+111)*+-+-+++-+.+-+++-.-.++-.-.-+-+.-++-+++-.+-+-++--+-+-++-+.-+.+-+-+-+.++-.+-++-+-.-+-++-+.-+-.+-+-.-++-++-++-.++-.+-.+++-++-+-+*-.-+-+++-++-+-+++-++-++.-+.-++-++-/++-.-++-+'*-/*-+.-/+-+.-+-++*-++-+.-+-+-+-+.+-+.-+-++.-++-+-++-++-+-++-+-+-.+-+-+-+-.-++-++-+-++-++-.++-.-++-.++-.+-.-.+-.-.+-++-.+++-.-++-+-+-+-+--++-+-.+++-+-+-.+-.+-.-+-++-++.-+-511*+-+-+-++-++-.-+-.-+.+-/-++*.-+.-++-++-0-.+-++-+-.-+-+++-.-+-0*-+*-++-.-+.-++-.+-++-0-++-++-/.11 +-/+.-.-+-+-.-+-+++-+-++++-.+-+-.-+-.-++-+.-+-.+*.-+.-++-+-+-++,+-+-+-++-+.-+-++-+-.-++-++-+-.++-+.-++-.+-+-+-++-++-.-+.-/+.-/++-.+-+-.+-+.+-+-.+-.-+-++-+.-+.-+-.-+-.+-++  +*-+.-+-.-++-+.+-0-+.-+-+-.+-++.-+-++-+.+-+-+.-.++.-+.-/+,+-+.+-++-.+-.+-+-++-.+-.+-.-+,-/-+-+-.+-+-+-++-/++-+-+++-.+-++-.-++-.-+-.++.-.+.+-++-+-+-+.++-+-++-++-++-.-+-+-.+-1!++-+.-++-0+-++-++*+-+-+-.+-/-++-+-.-+-+-++-.+-0++-/.+-.-++-++-++-0+-.-++-++.-++-.+-+-+.-+.-.-+&12+-.-+-++-.+-++-.+-+-+-.+-+-++-.++-.++-+--.+-+.++-/-++-+-.-++-+.-/-.+-+-.-+-++-.+-+.++-.-++-.++-+-.-+-.-++-.++-.+-.+-+-+*-+-+-+-.-++-.-++-.-+-.+-+-+++-.+-.-+-+-+-++-+++-+.-   .+-+-++*-+.-+-+-+-++-+.+-++-.-+-++-.-+-+-.+-+-+--+-+-+-.-/-.-+-+.-++-++-++.+-/*-/*-+++-/*-++.-++-+.+-.+-.-+-++.-+-++-.+-+-++-/++-++-+-++-+-+.-.++-.+-+-.+-+-.+-.+-++-.+-++-+)16.-++-+.-+--.+-.+-/-.+-.-+-.-+.-/.+-+.-++-+-+-+-+-.-+-+-++-.+-.-+-+-/++-.-+-+-+-++-/,-+-+-+-+-+-1++*+-/*-/+-.+-++-/.+-++-.-.+-+-+-+-+-+.+++-+--+-.-++-.++-.+-.*-+-++-+.*+-.+-.++-.*-+-++-.-++--.-++++-+-+-+-+-+-+-+-.++-0+-.+-++-+-+-+++-+++-++-0++-.-++-+-+++-.+*.-++-.-+-+  *-0++-0-++-+.-+.-+.-+-+-.+-/++-.+-++-.+-++-.+-++*.-+-++-+-++-++-+-+-+.-+.-+-.-+.-++-.-+-.+-/-++-.-+-+-+-++-.-+-+-.+-++-+.+-.*-+-.+-.-+*-+-+-+-+-.-+-+-++-.+-+-++-.+-++-+.-++7+-+.-+-+-.+++-/*-.-++-++++-+-+-+-+-++-++-.++-++.-++-++-.+-++-/*-+.-+-+-++-.+-.+-.-+-+++-+.-++,+-&+-0-.-.*-+-+-.+-.-+-.+-+++-+-++-.+-+.-+-+-+.+++-+-.-+-+-++-+-/+-+.-++-/-++-+-+-+-/+-.+-++-+-+++-+-.-++.+-.+-.+++-++-.-+--++-.+-.++.-+-.-+-.-+-+-+-/-++-0++-.-++-/-+-.-+-.++ ,*-+-+-+.-+-+++-/*-++.-++-.-+-++-.+-++-.+-++-.+-/-++.+-++.-+.+-.++-.-+-+-+-++-+-+-.++-.-+-.-+.-/++-.++-.+-+++-+.+-+-.-+-+-+-/.-++-+++-0*-.+,+-++-+++-.+-++-0++-+-+-+.-++-+-.-&+++-+.+-++-+-.-++-++-.+-+-.+++-+.-+.-+.-+-.-+-+-++-.+-/+-.+-+-/++-+.+-.+-++-++-++-.+-.-++-++-/-+ --+-+++-/,-+++-+-++-++-.-+-+-.+-++-++-+-+-.-+-.-++++-++-.+-0*-+-.+-/.-+-.+-0++-.+-+-/+-.+-/.+-+-.++-.+-+-++-++-.-.+-+-+++,+-+-+-+-+-+.+-+++-+.*+-.+-.+-+-+-++-.-+-.++-++*+-* (++-+.-++-/,+-.-+-.+-/-++-++-.+-+-+-.+-++-.+-/*-.-+.-+-.-+-+-+-+-+-++*+-+.-+.-+.-++-/-++*+-+-+-+-+-+-+-++-.-+-.-+-+++-+.-+.-+-+-.-+-.-+-0++-/-.+-+-.-++-.+-+-+-.*-+.-+-.-+++-.+-.-+-+-.+-+-+*-+-.+-+*-0-++-0-++-++-+-+-++-.+.-++-++-.-+-+-.-.-.-+-+-++-.+-.+-.+-++-++-.-++-.-++-+.++-+-+-/+.-+-.+-+-.-/++-.+++-.+-+.-+-+.++-++-+.-+-.+-++-+-+.*-+-+--++-+-+-+-++-.+-.-/+-.-+-.+-+-+-+-+-.+-0+-+-++-.++-.-/-.+*.-+.-+-+-+-.-++-/-++-+-+-.+-.+-++-++-+-.+-/-.-  +-/*-+.-+-/-+-+*-+-.-++-.+-++-+.+-++-.-+-+-.-++-++-+-+++-.++-+.+-.+-0-++-++-++-/.-+-.+-/-.+++-.+-.+-+.-+-++.-++-+-.-++-++-+.+-++-++-+-+-+-+-++-.++-.+-++-.+-++-0++-++-++-.-++-++-.+-++-/.+-/.+-+-.-/*-/,-+-.+-+.-+.+-.+-++-+-.-.+-++-.+-++*+-+-.+-.+-++-+--++-+.-+-+++-.-++-.-++-+-.-.-.-+-+-++-.+-++-.-+-.-+-+-.-+-.++-+-+.-+-+-.-+-.+-++.-/-.+-.+*.-++-.+-0*-++-+-+-.-++-++-.++-.++.-+-+--+.-+-+-+-+-+-++-/-++-++.-++-+-.-+-.+-.++-++-++-.+-.+-++-+-.-+++   **-.+-+-.*-/.+-0++-++-.-+-.+-.-+-.+-/*-.+-++-+-.+-+.+-.-+-+-.-+-++-+-+.-++-.-+*-+-+-+-.-++-.-++-++-++-+.+-+-++-+.+-+.-+.-+-+-+.-++-.+*+-+.-.+-+-+-+-+-.-++-.+-+-+-++-.+-+-++-.+-++-.+-.-+-.-+-.+-++-.+-++-+-.-+-+-+-++-0+-+-++-+-.+-++-.+-/-++++-++-.-+-.+*+-.-+-.+-.-++*-0*+-.-+-+-++*+-.+-.+-++-++-+-+++-+-.++-+++-.-+-.+-/+.-++++-+-.-+-+-++-++-/-+.-++-+-+-.-+.++-+++-+.-+-+-+-+--++-.+++-+.-++-.+++-.-+-+.-+-+-+.-+.*+-.-+-+-+-.+-+-+-+-++-.-0*+-++-+-.+-+-.++-0*-+-+-+-.+-+++-++-+++-++-.-+++-.+-+.-+-.-+-+-++-.-++-+--.+-+-+.-+++-0*-++,+-++-/*-/*-/,-/.-+-+-/,-+-.+-+-+-+-+-+.-++-+.-++-0-++-/*-0++-+.++-+-.-++-+-.*-.-++-0++-+-+-.+-+-++-++-++-++-+.-+-+-.-++*+-+-.+-++-+-+-.++-++-+-.+-++-.-+.-.-+-.-++-++-0-++-++-+-++-0-+-+-+++-.+++-/-++-++-.+-.+-.++-.-+.+-+-.+-+-++-++-+-+-++-.-+.-++-.-++-.+-.-++-+.-+-.+*+-+-+-.+-.-+-+++-.+-.+++-++-.-++-+.-++-.-++-+.-+-.++-+-++-/-++++-.+-++-.+-.+-++-+-+-+-+.-+.+(*-0++-+-+-++-.+-.-+-.-+-+.-+-.-+-.-++-0-++-++-++-++-+-.+-++++-0+.++-.+-+-+-.-+-.+.-/-.+-.-+.-.+-+-+-+.-+.-+++-+-+-+.+-++.+-+.-+-+-/-+-.+-+-+-+-.-+-+-+.++-+-.++-/++-.-+-.-/.+-++-.+-+-.+-.+-.+-++-+-+++-+.-/-.+*+-0*-0*-++-.-+.-++-+-+.-+*-+-+-+++-++-.+-+-.+-++-+.-+-+-++-.+-.-++-.-+-.+-+.-+-+-+-+-+-+-+-+-+-++-.-+.-++-.-+.-+-+-++-++-++*.-/*-/*-.-++-+-++-/-.+-+-+-+-+.+-0-++-++-.-.+-+-+.-++-++-+-++-.+-+++-.-.+-+-.-+.-+-++-.+-+-.++-.+-.+*+-+.-+-+-*+*-+-+-.+-.-++-++*+-+.-+-+-++-.++-++-+-+.-+.-++-.+-.+++-.+-.-+-+-+-++-.+-++-+-+-+-+-++-+-+-+-+-++.-++-++-+-.-.+-+.-+-.+-+-+-+-.++,-.++-0*-.++-+-+++-.+-+-.++-.-+-.-++-++-+-+-.+-/+-.+-+-+*-/-+-.-++.-.-++-+-++-0-+-++-+.+-++-+-+.-+.-+-+-/.+-++-.-++-++-+-++-.+-.+-+.+-.+-++-+-.+-+-.*-+-+-++-.++-.+-+-.++++-.+-+-+++-.+-++*+-+.+-.+-+-.-.-/-+-+.-+++-.-++.+-.-++-+.*+-.+-+-+-++-.+-+-++-0++-+-.-+-.+-.+-++-+-.-++-+-.++-++-+-.+-++-.++-+-+-+-+-0-++-++-.+- .+-+.-++-++-+-.+-/-++-+.+-+.-+-+-.+-.+-+-+--+.-++-+-+-.-+-+-++-++-.+-++-+.-++.+-++-.+-++.+-++-.-+-+.-+-+-++-++-++-++-+-+-+.+-++&4+++--+-++-.-.+*.5++-+-+-+-++-++-++-.+-+.+-++-.--++-+.+-/*-.++-.-+-++-.-+.-+-+-++-.-+-+-++-.+-+-++-++-+.-+-.+-++-.-.+-+.+-+-+-/*-/*--++-+.-+-++-.++-0++-.+-++-.-++-.+++-7+++-.+-.-+-+-.-*%&,-+-++-+.++-++-.+-+-+-.-++-+-+-+-++-.+-/-++-++-+.-+-+-.+-+-+-+-0++-+.+-++-+.-+-++-++-.++-+-.+-.++-+-.-+-+-+-.++.-++-+.-/.-++-+ (*-/*-++-0+-.+-+-.-+.-+-+-.+-/++-++-+-+.+-++.+-/*-/+.-+-+++-.+-.+-/+-.+-++-++-+-.+-+-+-.-+-.+-+++-.+-/+.-.+-++-+.-+.-+.-+.-+-.+--16*++.-+-++-+-/&14++-+.++-0*-.+-.+-++-+-+-.-+-++*.-+-+-.-++-+-++.-++-++-+-+.+-++-++-.+-+.-++-.+-.-+.-++-+-++-.+-++-+-.-+-.+-+.-++-.+++-.-+-.++-+-+-+-+-++-.-++-++-++-.-+&1%+-++-+++-++++-(16+++-.-++-+-++-+-+.+-++-++-.++-+.+-+-+-+-.+-+.-++-+.+-++-.+-.+-+-+-+-+-+-.-+-+-.+-+.-+-+-.+-+-+-+-.++-++-.+-++-+-+.-+-+*--++-+.  ,*-.+-+-+-++-.++-.+-/.+-++-+-.-.+-0++-+-+.-+-+-.+-+-+++-.-++-++-.-+-+-+.-+-.-+-+-+.++-++-++-.+-+-+-+-+-++-.+-.-+-+-++-++-++-+-.+127*+-+.+-+++-(113+-.+-+-+-++-+-+-+.-+.+-+++-.+-/-+.-++-+-.-++-+-++-.+-++.-+-+.-.+-++-.-+-.-++-++-+-+.-+.+-+-+-.+-++-++-++-.+-+-.-+-.-+++-++-.-++-.+-.+-.-++-.+-.-+-+-++511-+-.+-.-.-*71*-.-++-.-+-+.-.++-+-.+-+.-+-.-+-+-.+-.+-++-.+-+.-+-+-.+-++-++-.++-.+.-++-++-.+++-0*-/++-++-++-.+-+-+-.+-++-+.-+-++-+.+-/.++-.-+ ++-+-.+*-+.-+-+-++-+-+-+.-++-+-+-+-+-.-++-+-+.-+-.-+-.-++-.-+.-+*-.+-.-+-.+-++,+-+-+-.+-+-+-+-.-++,+-.+-+-+-+++-.+-+-+.-++-.+-+-&111)-/+--.-+7211++-+-+-.+-+-.++-.+-+-+-.-+-++-.-++-++-.++-+.-/.+-.-+-.+--++-+-++-.+-+-+++-++-.+-.+-+-+-+-+.+-++-+-.++-+.-++-++-++-+-+-+-.+-+-+.-++-++-/++-+-+-++-.+-++-,1127++-+-+*+4111&.+-++-++-.+-+-+-.-+-+-.+-+++-.++-++-++-+.-+-+-+-+.+-++-0+-.+-+-+-++-+-.-++-++-.-+-++-.-.+-+.-++-+.+-++-+.-+-+-.-.-+-+-+-+--++-+(+-0++-0-++-+++-.+-+-.+-+-+.-++*+-+.-+-.+-.++-+++-++++-++-++-+-+-/++-+++-++-++-/-+.-+-+-0+*.-++-+.-/-++-.++-.-+-++-.+.-+-.-++-++.-11113++**+%11114+-++.-++-.+-+-+-+-++.-+-.+-.-++-.-+.-+-+-.+-+-+-+-++-+-++.-+.-+-++-0++-.-++-++-++-+.-++-.-+-.+-.++-.-+-+-+-.-+.+-++.+-.+-+-.++-/*-0*-+-.-+.+-.+-++-+.-+-&1111%-*++*611116+-++-.+-++-++-++-+.++-+-+-.-+-.-++-.+-.+-/*-+.-+-+-.+-+--++-.-+.-+-+-+++.-0*-+-/*-.-+-++-.+-/*-/+-+-.-++-+.+-++++-.+-/,-++,+-++ **-+-+-.+-+-.-++-.+++-.+-+-+.-0-++-++++-+-+-.-+-+.-.-+.-.+-/.+-.-.-+-.-++-.+-.-++-++,+-+-/-+.-++-+-.+-+-+-+++.-+-++-+-++-++-.-+-*11111!++6111115.*-+-++-++-++.-+.+-+-++++-+++-.++-+-++-.+-+-+.-++.+-+.+-+-++-+.-+-+-.-++-.-.--++-+-++.-+++-++-+-+-+-.++-+.-++-/-.+-+-++-+++-+-.-++-+.-+-+-+-/+-.+-.-+-.+5111113*. 1111*++-.-+-.+-.+-/.-++-+-+.-++-+++-+-.-+-++-+-/.+-/.+-++-.++.*-++++-+.+-.+-+-+-+-+.-+++-++-+-+-+-.+-.+-++-.-+-+-.+-+-++-+-++.-/-.+-'.+-.+-++-0++-++-+--.-++-.+-+-+-+.-+.-+-+-.+*-.+-+-+-++-+-/*-+-+++-+++-+.-+--++-.-+.-/-+-.-++-+.-+-++-.++-.+-+-+.-+-+-.+-.+-/++-.- 111111 11111++-.+-.-.+-.-+-+-+-.-+.-+-.-+-+-+-++.-+++-++.-+-+-+-+-+-.+-.-++-+.-++-++-++-++.+-.+.-+-+-+-.+-0++-.++-.-++-++-.-++-+-.+-+-.-+-+-+-.-+-++++-.+--++-+++-++-+11111!4111111&.+-++-+-+-+-0*-+-.-+-.+-+.-+-.-+.*+-++-.+-.-+-+-+-+-+-+-+-/-.-+-+-+-++-.-+*-+.*-+-.-+.-+.+-+.-+-+--.+-++-.+-++-.-+.-+-.-+-+-++-.  *-/*-+.-+-.-+-.-++*+-.-++-.+-++-+-+-+-.++-/-++-.+-++-.-++-.+-+-.-+-.-++-/++.+-++-+-+-++*+-.-++-+.+-+-+-.-+-.-++-+.+-++-++-.-+-+++6111111111111114.-++-++-+-+++-.+-++-++-+-++-.+-+.+-+-+-.-/-+-++-+.-+.+-++-++-.-++-++-.+-0+-++-+-+-+-+-++.+-+-+-+-+-+-++-.-++-/*-+-.+-+-.++-+-.+++-++-.+-.-++-+.+-.-+-.+-+.&111111121111116+-.+-++.+-++-.+-+++-++-++-+++-++-/-+-.-+-+++-+.+-.+-.+-+-.-+++-.+.-+.-+++-0++-/-++-++-+-+-++-++-.+++-.+-++-.+-++-+-+.++-++-.+-++(+*-+.-+-++-/++-+.-/-++-+-++-.+-.++-0++-.-+-.+-++-.+-/*+-.-+-.++-++++-.-+-.-+-.+-++.-.+-0-++-.-+-+-.+-++-+++-+.-+-+-.+-0+-+*-+.-+-+11111111211115+*+-0*-++.-/-++-.+-+.-+-.+-++-.-+-.-++-++-.++-+.+-+-+-.+-++-++-.-+.-+-+-+-.+-.-+.+-++.-+--++-+.-+.+-+.-++-.-.-+.+-+-.++-/-+.*+-.-+.-++-+-.+-.+-+-++-++-.-+61111111111111+-++-.+-+-.+-+-+*-.-.+-+-.-+--.+-+-.+++-++-.-+-+-++-++-+.++-+-.-+-+-+-+-.-+-.-+-.+-/.-++.-+.-+.-++-+-/+-.+-++-.-+.+-+-+-.+-++-.-+ '.+-+-++*-0*-.-++-+-.+-+.-+-+*-/-+-+-+-/*-++-+-.-++-.-+-+++-++-+-.-.-/*-++-+-++-.+-+-+-+-++-++-.+-++-+.-+-.-++-+.+-++-+--+.-++-+.-+&111111111111.-0-+-++-+-+-.+-++-+-+-.++-.+-/++-+-+.-+.-+-.-+-+-++.-++-+.-.+-++-+-+++-.+-+-++-+-+-.-+-.+*.-++-+-/-++-/*-/++-+-+-.++-+-.-++-/-+-/*-/+-.++-+-+-+-.+-.+-/++-*111111111111&.+-++-.+-+-+-+.-/++-+-.+++-.+++-.+-+-+-.+-+*-.+-.+-0*-0+-+-.++-+++-++.-++-+-++-++-.-+-0-+-+-+-+-.-+-.-+-+-+.-/++-+-.++-++-.-+-++*(*-0++-0-+-++-+.-+-++-++-+.+-/,-+*-.+-+-.+*-0++-.+-+-+.+-.-+.-+-+++-+-+.*-+.+-.-+-+-++.-++-.+-++-++-.+-+++-+.-+-+-.+-++.++-/.-+-+++-111111111111%+*-++-.-.+-+-+-.+-/.+-++-+-+-+-.-++++-++-+++-.++-.-+-++-.-+-+-.+-+.+-.-++-.+-.-++.-/++-++-/-+.-++,-+.-+-.*-+-/+.-++-+-++-+.-+-++.-++-.-+-+-+.++-++-/*-+-.-+-&1111111111116+-.-+-+-++.+-+-+-.-++-+-.-++-.-+-.++-.-+-.-/++-/*-+-++-+-+-+-+-.--.+--++-.+*.-/,-/*-++-+-++.-++*+-.+*+-.+-+-+-.-+-++-.-+-++-+.+-+(,*-+-+-++-.-++-+-.+-+.-+-+-.-++-0++-.++-/-+-+-++-++.-+-+-++-+.+-+-++.-/-.-+-+++-+.+-+-+.-++-/.-+-.-+-+-.-+-++.-+-+-.-+-+-+--+.-+-*711111111111)-/+-.++-+-.+*.-+-.-+-.+-+-.++-+-+-.-.-+-.-+-+-.-+++-+.-/*-++-++-+-+-+-+*-++-+++-+-+-.-+.-+-.+-+-/-+-+-++-0*-.-+-++-.-+.-+-+-.-.-+-.-+*-++-.+-+-.+-.-+.-+-+.+)1112111211117++-.++-+.-+-.+-++-+.-++-+-+-+-+++-+-++++-++-.-+-.+-++-+-.+*+-.-++++-++.-++-/-+-++-+.*-+.+-+-+.-/-++-/-++-.+-++-+-.+-+-+.+-.++-+-.''++-.+-.+-++-.-+.++-.-+-.++-+-+-+-+-+-+-+-.+-+-+-.-+-+-+.+-+-+-+-.+-+-+-+++-+-.-+-+-.+-+-+-.*--+.++-++-++-.+-/-+.++-++-.-+.+++-+.+%111121112111115.+-+-+-++-/-++-++-++-.++-.-+.++-++-+++-+.-++-++-.-+-+-+.+-.+-+.+-/+.-+.-++-.-+.-++-+-+-++-+-/,-/+.-+.-+-+++-.+-+-+++-/.+-++*+-+-++-/+.-/+-+-++-++-+-++++611111111111111%-/*-.-+-+-++-.+-.+-+.-+++.-++-.-+-.+-+-.+-+-+*-+-.+-.+++-0-++*+-0-+.-+-+-+-.+-+-.-/-+-+-.+-+-+-.+-+-.+-++-.+-.+++-0++-+-+-+-.-++( +-/*-++-.+-++-+-+-+-+++-/-++,+-.+-+.-+.-++-.++.-++-.+-+--.+-.+-++-.+-.+-+-.++-+.+-++-.+-++-/+++-+-.+-.+-++-.-++-+-+.-+++-+-.-++611111111111112111&++-.+.+-+-.+-.+-+-.-+--++-+-+-.+-+-.-++-++-+.-+-.+-+.-/-++-.-+-.-+-/-+-.-++-+-++-++.+-.-+.+-+*-+-++-+-+-.-++-.+.-+-.-+-.+-/-++,+-.-+-+--.+-.-++-.+-.-+&211111111111111125.+-+++-.+-+-+-+-++-+.-+-+.-/*+-++-.-++-+.+-0++-+-+--.-+-++-0-+-++-+-+.+-++-.+-++-+.+-++-+.+-++-.-++-.+-+-+-+-.-+-.-++-.+-+++-+**-.+-+-+-.+-.++-+.+-+-.-+.-/-++-++-++-/,-++-+-++-++-.++*+-++-.+-+-+++-.++-/-.-+-+.-+*-0+-.--.-+-++-++-.-+-+-.-+-.+-+-+-.-+-++&21111111111111111111(-/+-+-.-++-++-.+++-+++.-+.+-++-.++-.+-+.-0-+-+++-++-+-.+-+++-++-.+-.++-++-+.+-.-+-+-+++-+-.-/.+-+-.++.-++-+-+-+-++-+-++-.-+.-/-+-.+-.+++-++-.-++-++-11111111111112111111&++-.-++-.+*+-.+-.-+-+-.+-+-0-+.-++-+-.-+-+-+-.+-.+++-+-.-+-+*-.-++.-+-.+-++-.+-.-+-.+-.-+-.+-+++-.-+-.+*+-.+-++*-0*-/+-.-+-.+).+-+-+.+-++-+-+-.-+-.+-+-+-+-.+-.+-/,-+-+-+-.-++-.+-+-+-0-+.-+-.-++-.-+-.-+-++*+-+-+-0*-+-++++-.-+-.+-/++-.+++-++-+-+.+-++++-111111111111111111111127*+-+-.+-+-.-+-+-.+-+-++-+-.-+-+-+-.-+-+-+++-0-+.-+-++-.-/-+.-++-+-+-.+-.-+-++-.+-+-.-+-+-+-+-.+-+-+-++-.+-++-.+-++.+-/*-+-+-.++-++*-+-.+-++-+-++71111111111111111111111(-/+-+-++-0-++-/++-.++-+*-+-++-++-0++-++-.+-++-++-+-+.++-++-0++-+-+-++-+-.-++-+-++-+-+++-++-.-+-+++-++-0-++-+-0-+-.+-+-++-++-*-/.+-/-.+-++.-+++-++-++.+-++-+-+-.-++-.+++-+-.-++-.++-+-++-+++-.+-+-++-++-.+-0-.+-++-++-.+-0-++++-+-.-+-++-+-.+-++.-+-.+-*711111111111111111111111114*.+++-.++-++-.-+-.-+.-+-++-.+-++++-++*+-.-+-++-+.+-+-++-.+-++-++.-++-+++-.+-++-.++-+-.+*+-.-+-.++-.+-+-++,-++-.+-+-.-+.+-++-+-+-0-+-++-.+-+.++%111111111111111111111111127*+.-+-+-.+-.-+-+-+-.-/.+-+-.-/*-+-.+-++-.+-.+-+-.+-+-+.-+-+-+.+-.+-.++-++-++.+-.++-.-+-+-++-.-+-.+-+-.+-.+*-+++-+,-.+-.+-+ ''+*-+-.-++-.-+-+-.-+.-+.-+-.+-+.+-++-+-++-.-+.++-.-+-.-++-.-+-+-++-.++-+.+-/*-+-++-.+-.-+++-+-++-.-++-++-.+-+-/*-0-+-++-+-/%11111111211111111111111111115+--+-+-.+-++++-++-+-.++-++-+.-.-+.-0-++-+-.-+-+-.+-.-+-+-+-.-+-++-.-+-++-.+-+-+-+.++-0-++*+-+-+-+-+.+-/-+-+-+-+-+-+-+-.+-+.-++-+.+-+-+-++-611111111111111111111211111114+-+.-++-+-+*-.+-++-+-+-.+-++-.+-++-+.-+-+-+-.+-+-+-.+-+-+.+-/-++-+-+-+-.-+-+-+-+-+-+.+-.+-+++-++-0*-+-+-/-+-.-+-/++-/*-.+.+-++-++-+++-.++-++-+-+-+-+-+-+-.+-.+-.-+-++-+-++-++-.+-++-.+-.+-+-+-.-+-.-++-++-+-+-++-.-+-.*-/-+.-+.-++-.+.-++-++-.-+++7%%%%%&7777741111112777"57%%%%%%++.+-+-+-.+-+-.+-0++-.-++-.-+-+-+-+-++-.+++-.+-++-+++-.+*.-++-+.-/*-.+-+-+-++.-++-+-+-++-0-+.+-.++-+-.-++,+-.+-.+++-.-+-++-+.-+-+-+.+-+.-+%%%%%%777777111111)77777 %%%%%7++-++-++.-/++-.+-+.+-++-+-.-+-.+-++-++-.+-++-++.-++-++.-+-+-.+-++.-+.*+-.+-++.-+.+-+-++-.+-.-.-+-+++-+.-.++-+-.-+-+-.+-+)  *-0*-.+-.-+-++-+-.-++.-++.+-.+-++-/*-+++-+.-/-.+-.+-++-.+-++-++-+.+-+++-++-.-+.-.++-.+-+-+++-/.-++-++-+-+-+-+-.-+.-+++-.-+.-+-++-/*-/6111111)+-+++-++-+-+*-/-.+++-+-.-++-+-+-/-.+-/++-++.+-++-.-+-.-++-.+-.-+-++-/-++-0*-+-/++-0*-.+-/-+.-+-.+-.-+-++-+-+-.-++-.+-/-++-++-.-++*+-.-++-+.+-.-+-.+-+++-++-+-++-++41111113/+-+++-+-+-++-.+-.-+-+-.-++-+-+-.+-.+*+-++-+-.-+-.++-.+-.-+-++-.-+-++-.-+-.-+-++-/-++-.-+-+-+-+-.+-+-+-+-++-+-.-++-+-+-+.++-.+-+-+-+),*-++-+-++-.+-.-+++-/-+.-+-++-+.-+-.+-0-++-+-++-++-.+-++-.+-.+-+-/-.-+-.+-++-+-+-+-++-.++-.-+--+.-+.-++.+-++-++-+-.+-.-++-+-.++-+-.+-+11111 ++-.-+,-/.+-0*-/*-0-+++-.+-.+-+.-++-.-+-.+-+-.+-++-++-++-++-+++-0*-+-.+-+-++-.-.-+-+++-.-++-/++-++++-+.-+-+++-.+-++-+-.+-.+-+-++-0-++-.-+-+-+++-++-+-.-+.-+.+-.++-311111*+-+-.-+.+-.+-+-+-++-.-+-.+-+.+-+-+-+-/-.+-.++-.++-+-++-+++-.+-+++-.+-++++-++-.+-+-.+-/++-+-.+-.++-0++-++,+-.++-.+-.++-0*-+-++-.++-+.  ++-.-+++-.-+-+++-+-.-++-+-.+-.-+-+-+-+-+.-++.-+-.-+-+-.-++-+-+,-.-+++-++-.+-.+-++-.+-+-+-++-.+*+-+-+-.-+-+.-.+-.+-+-+-++-0++-+-.+-+-+-%11112++-+++-/*-+-+-+.-+*-.+--++-/*-/*-++-++-++-+-.-+-.-+.+-+-.-.-+-.-+-.+-++-.+-.-+++-+-+-.-+-+.-+-.-+--.-++-+.+-0-++-+-.-++-+-+-.+-.-+-++-++-.+-+-.-+.-+++-++-+-+-+-+-.+1111)+-++-++-+-++-0++-.+-++++-+-+-+-.+*+-+,-++-+-+-+-+-+-.+-+-.-+-+-.-+-+-+.-+-0+-++-.+-+-.-+-.+++-/*--+-+-.+-/-+-+-++-+-+-+-++-.+-+-+-.+-' ('+-/++-.-++-++-0-+.-+-.-+-++-+++-++.+-++-+-.-+-++++-.++-.+-/.+-/++-+-.-+-++-++-.+-++-0++-.+-++-0-+.-++-+-.-+-+-++-+++-.+-+-+-.-++-.+-.+51111+-+-.-+-.+-0*-+-+-/+-+.++-+-.*-0-+-.+-.+-+-++*+-++-+-.-+++-+-++-+-+-+.-++-++-+--++.+-++-.+-+-++-+.*+-.-+-+-+-++-+.+-+.-+.+-++-+++-.+-.+-++-.+++-+-+-.-++-.+-++-.++-+41111 +.+-.+-0*-.-+-.-++-.+-+-.+-.+-++-0-.+-+-.-++-.+-.+-++-.++-++*.-++-.+-+-+-+-+-.-+-.++-++-++-.-+-.+++-.-+-+-++.-++-0*+-.+-+-++-+.+-++-+**-.-+-++-.+-+-++-++*+-.++-+-.-+.-+-.+-.++-+-+.-+-++-+-+-+-+-+-+-+.+-/.+-+-.-++-.+-+-+-++-.+-+-++-++-.+++-++-.+-+-.-++-.+-++-+.-++-++-.111&.+-++-.-+-+-++.-+.--+-+-.-++-/*-+.-+-++-0+.+-/-.+-+-+++-.-++.+-/+.+-+-++-.*-0++,+-+-+.-++-+-.+-.+-/-++-.+-.+-+-.-+-++-+-+-.+-+-.-++-++-.+-+-+--.+-++-.+-++-.+-+-+-.-71112+-+-++-+-+++-++-+-+-+-.-++-++-0*-+-++-/++-++-++-++-.+-+-+-+.-/-++-++-.+-.+*+-++-++-+-+.-+.-+-++-+-.-++++-.+-+-+.-+-/-++-.+-.-+-+-.+-++.+-++-.+-++-.*-.-++-0-++-.-++-++-+-++-+-+-+.*+-+-.+-+-.++-.-+,-.+-+-+-+-0++-++-+-+.-+-.-+-+-.+-.-+.-++-+-.+-++-+.+-+.-++-+.-+-+-+-+.-++4111-+-.+-++++-+.-/-++-++.+-+-+.-+-.+*-++-.-+--+-.-++-+.+-+-++-+-+-.-+--.+-.-+-/*-+-/-+-++-++-/,++-/*-+-.+-++-++-.++-++-.-+.+-++-.++-++-.-+-+-.+-.+++-.+-+-.-+-++-.++-/++*111)++-.+-+-+-.-++-.++.-++-.+-.+-+-+.-++-+-.-+.-.+-.+-+-+-+.-++-+-.+-.+-++-++-0-+.-+.-+-.-+-+-/++-.++-+-+-.-++-+.+-/*-.-+.-++-++-.+-++-.+-'*-/,-++-0+-+-/++-.-+-++-+-+.-+.-+-.+-.++-++-/-.-++-.++-.-+++-/++-.*-.+-+-+-.+-.+-+-+.++-.+-++-+++-+-+-.-++-+.-+-+-+-+-+-.+-++.+-+.-+-+-311+-++-.+-+-.+-+-+.-+.-+-0++-+-++-/-.+-++-++*+-+-+-.-+-.+-.-+.+-/*-.+++-++-++-.+-.-+.+-.-+-.-+--.-+.-++-.+-.+-+-+-.+-+++-/-++-+-+-+.-++-.+-++-++-+-++-+-+++-.+-+-+-.-+-/)11 +-++-.+.+-+-.-++-+-++-++-++-.+-+-+.-+.-++-+-+-++-++.-++-+-.-++-+-+-.+-+.-+-++-++-+-++*+-.+-.-+-.-++*.-+-+-.-+-.-/*+-+-++-.+-++-.+-++-.'+*-++-+-+-.-+-.-+++-+.-+-++-++-/++-+-+-.-.-+-+++-.-+-+-++-+-.-+-+-/++-.++-/*-/+-.+-+-+-++-+.-+,--+-.++-++-.-+-.+-++.+-++-+-+-/-++-++-.++1&++-.-+-.-++-++.-+-+-+-+-+-.+-.-+-++-.+-.+-0-.++.-++-++-+++-+-.-++*-+-.+-.+-+-/*+-+-+-++-++-++++-+-++-+-+-+-+.+-++-.-+-.-+.-.+-+-+-+-.++-.+-.+-0-+.-/.+-+-++-0++-++-+.-712+++-+-+-+-++++-.-+-.+-.+-+-++-+.+-+-++-++-+++-.+-.-+-+.-+++-.+-++.-+-.-+-/*-.-++-0++.-/-++-+-+++-.+-/-+++.-++-+-+-.-++.-+-+-.+-+-+-.-++ .+-+-+.*-++++-++-.-++-+.+.-+-/,-+-.+-++-++-.+-.-++-++-.+-.-+*-.+-+-.-+-+-.-+,--++-+.+-+.-++-+-/+.++-+-+.-/++-++-.+-+-.+-+.+-.-+.-++-++-+41-.-++++-++-.-+-+-+++.-+.+-++-+++-.+-/*-/*-+-++-+-++-+.-/,--.-++*-0-+-++-++-.-+-+-+.+-.+-.+-.+-+-.+-+-.+++-+.-+-.-+++-++-++-++-.+,+-++-/-++-+-+*-++-+-+-.+-.-+-.-+.-++-+-2+-.-.+-+-+-.--++-++-+-+-.+-.-+-+-.+-.-++-.-.-+-+-++-.+-+-.-++-.-/-++*+-++-.++-.-+--+-+-.+-++.-+-++-.-+.-+-++-.+*+-++-+-/.+-++-+-.++-/*-*-0+.-/-.+-.-++-++-.-+-+-+-.+-++-++-.+-++-++-+++-+.+-/*-/++-/++-.++-+-+.-++-/+.+-.+-+-+-+.-+-+-+-+-++-+-+-.-+.-+-.-+-+-.-+-++-+-+.-.+-0-7(+-++-.-++-++-.+-+.-+-++--.+-+-.-++-.-++-.+-++-+-.+-.+-+-+++++-0-+-+.+-.-+-++*.-+.-+-++-++-/*-0-++-.+-+-.-++-+-+++-.-+.-+-.-+-++-/-+.-+-.+-/+.-/*-.-+.-++-++-++-++-+.-+++)&/+-++-.+*.-++,+-+.-+.+-++-++-.+-++-++-.-+++-+++-.+-++-++-++-+-++-.+-/-.+-+-+-++-+++.-+-+-.-+-+-.+-/*-+-+-+.-++-0-++-.-+-+-.+-.++-+-+-.+'(,*-+-+-++-+-+,-0+-++-.+-+-++-.--.+-++-0*-0*-+-0-+-/-.-++-.-.-+-+-+-+.*+-++-.-+-+-+-+-.+-+-++.+-.+-+.-.+-++-++-+++-++.+-++-.+-.+-+-+-+*-+.&+-.-+-.+-.+-++-/*-/-.+-+++-.++-.+-+*-.-+-.+-.+-++-+-+-+.-+-+-+-++.-/-+++-.+-/-++-+-.+-/*-.-++-+.-++-.++-.+-++.-+-+-++-+++-+.-+-+-.+-+*-+-.-+-+-.++-+-++-.+-++-+.-+-+-.-+ -.-++-++-/-++-/-++-+-+-.+-.+-/+-.+-.+-+++-.-+-.-++-0+-.+-.+-+.+-+-+-.-++-.-+.+-+.+-+-++.+-++-+.-+-.-+.+-+.-+-+-+-.+-+-+.+-++-+-+-+.-.+-+' ++-++-.+-/*.-/*--.+-++-+.+-+-++++-.+-+-++-+.-+-+.+-++.-/*-/*-.-+.-++-/-.-+-++-+-+.+-++-.+-.-+-++-0+-++-.+-.+-+-.-+.-+-++-++-++-.+-++-0+-+-+++-++-.-+-.+-.-++-++-.+-.-+-+-+-.-/++-++-.-+-.+-+-.++-+-+.-.++-+-+-+.-+-+-.-+.-+-++-.-.+*-.-++-+-.-+-+-+-.+-+-+.-+.-+-.-++-+.+-++-+-0++-++-.-+-+-++.-+-+-.+-.-++-.++-++-+-.+-.+-.-++-.-+.-/.+-++-+-/,-+-+-++-.+-+-+-++-++-+-+-+-++-+-+-+.+-++-.-+++-/-.-+-.-++-+-.+-.+-/++-+-+-.+-++-.+-++-0+++-+-.-++.-++-++-/+'+-0*-++-.-/-+-++++-.+-.-+-.+-+-.-+-.-+-.-+-+++-+-+-+--+-.+-+++++-+.-+-+++-.+-+.+-+-.+-++-++-+-.-+--++-++-+-+-.++-+-+-+.-.+-+.-++-.+-+-+-++-.-++-/++-++-++-.-.+-++-+-+++-.++-+-.-++-/++-++-.++-.-/*.-+-+--.+-+-+-+-.++-++-/.+-+-++-/-++-.-++++-++-.+-+-+-.+-/*-/++-+.-+-+-.+-.++-+-.+-++++-.+-+-+.-++-+-++-++-.-++-.++-+-+-++-.-++-+-+-+-+.-+-.-+-.+-+-+-+-.-+.++-0*-.*-++-.+-/.+-.-+-.+-+++-.-+-++-++-.+-.-++-/*-+-.-+.+-++-+-.++-.+-+--.-+-+++-/-+.-/*-+-,  **-+.-+-+*-0*-.-+-++-/++-++-.++-+++-.+*+-.+-.-+.-+-.+*+-+-.-+-.-+-+-.+-.-++-.-+-.-++-+.-++-.+*+-++.+-.-++-.++-+-/+.-++-+-+-+-+.-++-.-+-.+-++-.-.-+-.+-.+-++-+-.+-+++-.-+-+-.++-0+-.-+-.+-+-+-+-.-+-++-+.*+-.+,+-++-.-++-.-+-.+-+-+-.+-++-.-+-.+-++-.+-.++-+-.+-.-++-+.+-+-+-+-+-.-+-.+-.-++-0++-++.-/.+-+-.-++-.-+-+-++.-+.-+++-+.+-+.-++-/+++-+++-.+.+-++-++-.-+-++-/.+-++-.-+-+++-++-+-+-++-.+-.++-/+-++-+-+-.+-++-+-+-.-+++-+-+-+-.+*+-+.-+-.-++-+-.*-+-'.+-+-++.-/*-/++-.-+-+-.-+.-+-.-+-.-++-/-++-+-++-+.*+-0-+.-++-+-+.+-++-+++-+-+++-+++-.-+-.-++-/-.+-+-++-.-++-+-.+-+-+.-+++-.+-+-+-++-+.++-0*-/*-++-+-+-+-+.-++-+-.-.-++-.+-++--+-+-++-++-0++-.+*+-++-.++-/-++-/-.+-++-.-+++-++-+.+-++-.*-+++-++-0*-/+-++-+-+-+-+-.+-+-+-+++.-+.-++*+-+-+-++-+-+-.-+-+-+-.++-++-++-++-.-/-++-+-.-+-+-++-+.-+-.--+.-+-+-+-.+-.+-+-++-.-+-+-.+-+*-++-.-+.-+.+-.+-++-/-+-.--+.-/.+-+-+.+-++.-/++-.-+-+.+-++-/-.+-/*+-+-.-++-0++* '*-/.+-+-+-+.-+-++*.-++-++-/++-/++-++-.-+.-/++,-++-/-+-++-++-.++-+-.+-+-.-/.+-.-+.-+-++-++-+-.-++-+-.+-++-+-.-++-.-++-+-.-++-.+-.+-.++-+-+-+.-++*-.++-.+-+-+.-++-++-++-/+-+.-++,+-.+-.+-+-+-++-/-.+-+-+-.-+.-+-++-.+-++-+--.+-.-+-.+-/+-+-.-+.-+-.+--+.-+-0+,+-++-.-+.+-.-+-++-++-0-++-+.-+-.+-++-++-.-+-.-++-.+-+.-++*-+.-+++-+.+-+.-+-+-.-++*+-+-.++-++-++-+++-.++-.+-/*-.-/+.-+-+-+-+-+-+-.*-+-.+-++++-+-+-+.+-+-.-+-+-+-+-+.+-+-.+-.-++-+-0-+.*+-+-+-.-+'+*-+-.-+.-+-+-.+-/-+.-+.-+-.-+-.-++-+*-+-+-.-/-.-+-+.-+-+.-+-.-+-++-0++-+-+-++-+-+-.+-.+-.++-++-.+-+-.+-.++-++-+-+.-+++-.+-++-++-+-+-+-.+-+-+-0-+-+-++-.+-+-+.-++-+-.*-+-+-/*-/-++-+-++-.+-.-+-++-.-+++-+-+-.+-+-/-.+-+.+*+-+++-+-.-+-0++-+-+-++-+.++-+-+*-/-.+-/++-+-++-+-.-+-.+-+.-++-+.-+-.+-.+-++++-++-.-+-.+-++-0-+-+-.-+-/-.-+-.+-++*+-0-+.-+-.-+-+.-+-0-+-+-++-.-++-+-+-+-+.*+-.+-.++-0*-++-.+-.-+.-+.-+-.-+++-.+-.-+.-+-+-++-+++-0*-+-++-/-+.+-+-++ .+-++-++-++-.-+-.-++-++-++-++-++-.-.-/.+-.+-+-/++-.+-+.+-+-+++-.+*-+-.-++.-++-++.-++-++-+-+-+.-++-.++-++-+-.+-/.+-+-.-+-+-.+-++-/.+-.++-+.+-++-.++-.+-++-.+-+-+.-0++-0*-.+*-+.-++-.+-.-++-+++-.+-/++-0-++*.-+-.+*-++-.-+-0-+-.-++-++-+-+-.+-.+-+-+-+-+.+-/*-/*-+-.-+-+.-+.*+-++-+-+-+.-++-++-+-++-.+-+-.+-++-++-+-.-+-.++-++-.+-+++-++-.+-/-+-++-+++-+.+-+-.+-+++-0*-/*-.-++.-+.++-/-++-+-+-+-0++-+*-+-++-++-/*-++-.-++-++++-/*-.++-+-.-+-/*.-+-.-+-+-+.+-+'*-0*-+.-/.-++++-+-.-+--.+-.+-.+-+++-+-+-++-++*-.-++-+*-+-++-.-++-0-++-/*--+.-.-+-++-++-+.+-.-+-.-+-+-+-.+-++-.-+-.++-.+-++-+-.-.-+-+-+-+-+-.+-+-/-++-.-++-+.+-+-+-+-+-.++-0-+-+.-/+-++-+-.+-.-+-.-+-+-+.-/-++-+-0-+-+++-+-+++-+.-+.-+.+-++-++-.+-.+-.-+-.-.+-.+-++-.++-++-/-.+-/,-+.-+-.-++-+.+-+-+-.-++-+.-+.-+++-+++-.-+.-++-+-.-++-/+-.-.*-.-+-.-+-+-+-++-+-.-+-+.-+++-.-+-+-+-.-+.-/+.-+-+-+-.-++-.*-+.-+-.++-/*-+-.+-.-+-.++-.-++-+-.-+-+++-++.+-+-+-. ,*-++-+-+-++-.-+.++-.+*+-++-++-.-+-++.-++-.+-0-+-.-+-0+-.+-++-.-+-.+-+-.+++-+++-.+-.-+.-/-++*+-++++-.+-+-.+-++-++-+-+-+.+-.+-++-+-++.-/.+-++-++,-+.-++-+-.-+-.+-++-.-+-+-+-.+-+-+--.+-++-+-+-++*+-.+-.+-+-.+-++*-++.-+-+.+-.-++-++-+-+-.+-.+-++-++-+++-+-+-+-+-.+-++-+-.-+-++-.-/*+-+++-.+-.-+-+.+-/++-.-+-++-+-.-+-.-++-+-++-.++-.+-.-+-++-/++-+++-+.-++.+-.++-.+-+-+-.-+++-+.+-++-+-+-+-++,+-++-0+-++-+-+*-+-+-.-+.+-+-+-+-+-+-+-+.-++*+-.+-.-+.-/-.+*-++ ++-.-.+*-.+-+-++-+-++-0-+-.-+-++-.+-+-+.-++-+-++++-.+--++-.+-+++-++-+.-+-.-+-+-++-++-+-+-.+-0-++-.-+-.++-+-++-.+-+-.++-/-++-+.-++.-+-+-+-.-+-.-/-+-/+-.+-++-++-.+-++++-.+-++-.+-.+*+-.+-.++-.+-/-++-/*-+-++-0*-0-+-+-.+-+-+-+.-+.-+.+-++-/-+-.-+.-+-.-+.++-+.-++-+.-+-++-.+-+-+*-0-+-.-++-/++-.-+-.-+-+++-.+-.++-0++-+*-.+-.-+-+-++-++-.+*-+-.-+.--.+-+.-+-+-+-++-.+-++-+.-+-+-+-.-+.-+.-++-/-.+-+--.+-/.+-/+.-++-+-+-.++-.++.-+.-++-+.-/-++-+-+*-+-+-0-++- +-/++-/-++-+.+-++-+,-+-++-++-.+-++-.+-+-+--.+-.-+-++-++.-++-.-+-+.-++-++-+-+.-.+-.+-.+-+-+-+-+.-+-+++-+-.+-.-++-.++-+-.-++-.+-++--+.-+.-++*+-++-+.+--++-.+-.+-++-.*-.-++-+.-++-++-0-++-+-+-++-.-.+-+-.*-.+-+-++-+.+-++-++-+.-+-+-+-+-.-/*-.++-++-+-++-+-+-.+-++-.-+-.++-++-.++-/*-/++-++-.-+-+++-++-.+-0-++-+-+-+-+-+-0++-+++-.+-+-.+-++-0-++-++-+++-++-+-.+-+-+-++-+.-++-+-.++-++++-++-+.-.-++-++.++-.-+-.-+-+.-/.+-+-/-++-+-++-+.-/*-+-.+-+.+-/*-.+*-.+-. **-.-+-.+-.-+-.-+.-/+-.+-.+-++-.+-+-+.+-+.*+-+++-.+-+.-+-+-++-.+-+-.-++-.+++-+-+-+-++-.+*+-+.-+-.+-.-+-++-++-+-+-/-.+-+-.-+-++-.+++-++-++-0-++-.-+-+.+-++-+-+-.-+-/+-/+-.+-++-+.-+-++-.++-.+-+-++-.++-/++-0*-.-+-+-.-+-.-++-++-+.-++-++-.+-+-.+-/++,-+.+-++-++-+-+++-0-.+-+-+-.-++-.-++-++-.+-+-.+-++-+-++-0++-.-+.-++-+-+-.-++-.+-+-.+-+-+.-+.-+.-+-.-+-++-.+,+-.-++-/.-+++-.-.+-/-.+-+-+-++-.-+-+-+-++-+-.+-+-+-+-++*-.+-+-.+-++-+-.+-++-+-+-.-+++-/-+-++'.+-++-++-/*+-++-+-+--++-++-.+-+-+-+.-+-++-/-.+-.-+-++-+-+.+-+++-.++-.-+-+-.-+-++.-++-++-0-++-+-++-/++-.+-+,-+.+-+-++-+.*+-++-.-+-.-++-.+-+-+.-+++-+-+-+.-/++-++-.+--+-.-+-+--.+-/*-.-+-.-++-.++-+-+--+-.-+-+++-.++-+++-++.-+.-++-+.-+.-+-+++-+-.-.-/-+-+-.-+.-/.+-+-+-++-.-+.-+-.-+-+.-.+-++-.-++-.+-+-.+-+-+-+++*-+.-+-.++-++-++-.+-+-+.*-+-+-++-+-++-.++-++-/-++-.-+-+-.-/-+-+-.-++-+.+-++-++-.+-+-.+-.+*+-.++-.+-.-0-+-.++-+-.-++-+-.+-/.+-+-+-.-+-.+++- ' *-/,-+.-+-0-+-+.+-++.+-+.-++-0++-.+-/*-.-+-++-+-++-.-++.-+-.-+-+-+-++.+-++-+.+-+-/.-.+-+-+.-++.+-+-.-/+-++-+-+-.+-.-++-/-.+-/++-++-.-+--.+-+-+-.-++.+-+-+-.-+.-++-.+*+-++-+.*+-+-.++-++-++-+-+-.+-++.+-++-+-.-++--+.--0+-+-+-+.-++-+-+-++-.-++-++-+-++.-++-+-+-+-.+-.+-+-+++-++*+-.+-+-+-.+-+++-+-+-.++-.-++-.+-/-.-+-.+-+-0+-.+-++-++.-/-++-.+-+-+.+-++-.-+-+-.+-++-.+-++*-.+++-+-+-.-+-.+-.+-++-.++-+-+-/-+-+-++-+++-+++-+-+.+-+.-+.-+-.-+-.++.-++-++-.-++*-++-+-+*-/.+-/-.+-+-+-+-.-+-+-++-+-.++-.+-+-+.+-++-+-+-++-.+-.+-++-+-+.-+-+-.+-+-+--.+-+-+-+-+-.+-+--.+-/.+-++-++-.-+-++-.-+-.-+++-.+++-.+-++-+.-+-.+-++-.+-++-++-0-++-.+-/-+-+-+-.+-0+-+.-++-.+.-+-.+-.++-0*-0++-++*-+-++.-+-.-+.+-+.-+-.+-+.-++.-+-/*-.+-+.-++-+*-.++-.-+.-/-++-.+-+-+-.-+-.+-++-+-+-+.-/*-.-+++-++-/*-+-+--.+-+-+-+-+.-++-.+.-+-.+-+-+.+-++-.+-++-.+-/-+-.-++,+-+-++-+-+-.+-+-+-.+-+.-+.+-.+-.*--+-.-+-+-+-++-++-+++-+-++-+-++-0*-/-+.'.+-+-.++-0*-+-.-++-+-.+-++-++-.+-+-.+-+-++-.++-+-.+-+.+-++-++-++-0*-0-++-+.+-++-.+-++++-+.-+.-+-++-++.++-.-+-.+-.+-++-.+-+-++-/++-.-++-+-++-+.-/*-+-++-.+-++-+-.-+-+-.+-++-+-.+.+-+-+-+--.+-++-+-+-+-++-+-+-+-+*-+-.+-/-.+-+-++-++-+-++-+-++-0*-+*-+-+.-+++-.+-++-0+-+-+-++-+-+-.+-++-+.*+-++-++-.+-+-.++*-+-.+-+-+-.+-+-.+*-+.*+-.+-.+-++-++-+-+-+-++-.++-+-.+-++-0*-++-.-+++-.+-/-++.+-+.+-++-0++-++-++-+-+-++-+-/.+++-+-.+.-+.-+.-+-.-++.-++-.+-+-+.-++- *-0++-+-+-+.-++-+-.++-.++-+.-++-.++-++-.+-+-+-.-++-.-+-0+-.+-.+-+-++-+.-+-+-.+-/*-.+-.-++-++-+.+-.-+-+-+-++-++-/*-.+-++-+.+-/,-+-+-++-.-+.-++-+-.+-+.-+-.-+-0++-+.*+-+-.+-/*-+-+-.+++-+.++-+-.-++-++.-+-+.+-++-0++-+-.-++-.+-.-++-.+-.-+.++-+-++-/.-++-+-0-++-+-.-+-0++-.+-.+-++-.-+-.+-/-.+-.+-++-.++-+-0-+-+-++.+-+-.++-/-.+-/-++-++-0*-+.-.-++-+.-+-+-.-++-.-+-+-+-.-+-.+-+-+-+-.+-+-.-+-.+-+-+-.+-+.-+.+-.+-+-.-+-.-++++-+-+-+-+-.++-+-+-.-++-.+-+-+.-+ ',*-+-.-+.-+-++-.++-+-+-.-++-+-+-+-+-.-++-+.-++-+.-+++-+-+-+-++-+*-.-++-/.+-/*-+-.-+-+-+.-+.-+-+-++-+.-+-.+-.+-.-+-+-.+-+-+-.-+-+.-+.-++-+-+.-+.-+-/+-++*+-++-+-.+-/-+.-+-.-+.+-+-+-.-++-+-0++-.+-.-+-++.-+-.+-+-+-.++-.+-++-+++.-/*-/++-+-.-+-+-.--+.-+-+-++-.++-+-+-.-++-++-+.-++++-+-+-++-/+-.+-+-0-+-+-.+++-.-+-+++-.-+-++-+-.+-+.-+-.+-+-++.-++-+.-++-++-+-.++-+.*+-+++-.-++.-++-.-+++-+-+-.+-++-.-+-+-+-+-.+++-++-.+-.-+-++.-+++-+-/.+-++-.-++-.+-+-++ ++-++-++-++-.-++-+-.+-++-.-+++.-+.-++-+-.+-+.-++-+-.-+.+-.+-+-.-0++-.-+-+-.-+.-++++-+.-+-+-/.+-.+-.+-+++-+-+-+*-.+-+*-.++-+*-+++-/+-+--.+-+-++-++-.-/+-0-+.-+-++-+-.+-+++-+-+-.+*+-+-.-+-+-+-++-/++-.-+-++-+-.-+-+-+-++-.+-.-+--+-.+-+-.-+-.++.-++++-+.++-.-+-+-++,+-+-+-0+-.-+-+-.-+.+-.+-.-+-+-+-+-++.+-+-.-++-+-.-+6*+-.+-0*-+-.-+*-++3/++-+-+.-++-++-.+-.++-.-++-/-.+-.-++-+-+.-+++-.-+.++-+-.+-++-++-.-++-+-+-.+-++-+-+.+-+-+.-+-+.-+-.-++*-+-++-.+-+-'(+-/,-+.-/.-++-+-.-++-.+-++-.-+-++-++-.+-+-++-+.-+++-+-+-++-+.-++-+-++-.+-++-+-++-.-++-++-+.-+-++-++-+-.-++-++-0++- )-+-.-.-/+.-.-+-/!++-.+-+-.+-++-.-+-++-++.-+.-++-+-.-/.+-++-0-+.++-.+*+-.+-.-+-/++-.+-.++-++.+-.+-+-+-++-+.*+-+-.-++++-+-+-++-.-+-+--++-.+-.+-/-++,+-+-/*++-.+-+-+-++-++-.+-.++.-+-+-+++-++-.+*+-+)%*++-+-+++-++-+*+44+-.-.+-+-.-+.-+-/*-/-++-.-+-++-+-++-.+-+-+-+-+-++-+-.+-+-.+-.+-+++.-+.+-+-+-.-++.-+-.+-+-+-.+-+-+++-0-+.-.-++-.++ **-++-+-+-++-.++-.+-++-.+-++-+-.-++-+*-+.+-.-+-+-.-++.-++-.+-++-+-.+-++-+.-++-.-+-+.-+.-++-+-+.-++-.++-+.-.+-+-+-.616++-++-+-+-++-1 +-++-.+-+-.+-++-++-.-+-+-+-++-.++-+-+-.+-+-++-+-++-0-++-++-.+-.-++-+-+-+.-+-++-.++-.+-.+-/-.++-++-.-/+,-+.-+-.+-++,+-++-++-.-+.-/-.-+-.--++-++.+-+-.+-++-++-+-+.+-+.-+-.-++-/-.+&1(-*-.+-0-+.-++313++-++-.++-++-+-.-++-.+-++-.+-+-/.+-+-.++-.+-.+-+-.-++-++-+-++-/.-+-+-+-.+*+-++-+-+-++-.+-+++-+++-.-+-++-+++-.-+-,'.+-+-.+*-.+-+-+-++-+-+-+-.+-+.*+-.-/.-+-+-+++-.++-++-+-.-+-+-+-.-++-+.-++-/,-/++-.-+-+-+.-+.+-+-.-+-+-.+-++-.-+-+++11!*++-.-+-+*711--.+-++-.+-+-.+-.+-++-.+-.+-.-+-+-++.-++-0*-.-+-.+-+-++-0+-++-+-+-+-+.+-+-+-.+-+-+-++-/*-+-++--.+-+-+*-/-+-+++-.+.-/-.+-/*-+*-+-+-++*+-++,+-+-+--+.-+-.+-.+-.-+*-/-+-+-++-+-.-++-+217+*-+-++-++&1++-++-+-+-+.-++++-.-++-+.-++-.+*-+-.++-.-++-++-0++-++-.+-.++-.-+-+-.++-++-0-+.-+.+-+.-/+-.+-+-.-.-++-+.-/*--+-+++-''*-0++-/-++-.++-.+-.-+.+-++-++-/-++-+-/.+-+-.-+-+-.+-.-+++-++.+-+++-+-+-.-+-+*-.-++++-+.-+-+-+-++-.+-++-+-+-+++.-+-.!111-*-++.++%111++-+-.-++-++-+-++-.+-++-++-+++-+.-+-+-+-+-+++-++-.-++-.-+-.+-++.+-.+-+-0+++-+-+.+-.+-+-.+-.+-+++-.++-0*-/+.-+-+-+-+-++-.-+.-/++.-+.-/-+.-/-.+-.+*+-++-+-++-/++-0*-.*-+.+-+++-++-.+)111%*+,-+-/-)1114+-+.-.++-.+-+-.--++-+-.+-++-+-/-.-+-+-+-++-0*-+-+-.+-++-+-+-++*-.+-+-.-+-+-++-+-/-++-+-.-+-.-+++-++-.+-+-0+.*+-.-+ +*-+-+-.+-+-+-++-+++-+-.+-+.-+-.+-.-+-+-0++-+-++-+-+++-.-+.-+-.+-.-.+-++-+.-/++-+-.-++-++-.+-.+-++-.+-/,+-.+-+-++-+511113+*-*-(1111&+-.++-++-.+-.+-+-+-++-.-+-+-.-++-+.+-+.+-+-.-+.-++-.-+++-+-+-.-+-++-.+-+-.-++.-+-++-0*-+-++-+.-+-+--+-+.-+-+-.+-++-.+-++-+-+-.-+-+-+-.+-+-++-++-0-+.-+.-+-+-.-+-/+-/.+--.-.-+.-/*- 11116*+,+311113+-+-+-/-++-++-++*.-++-+-+-0*-.-++++-+.-+.-+-.-++-+-+-.-+.+-.-/-++-+++-+.+-.+-+-.-+.-++-++*+-.+--+-.-+-+-+-+-/-++-+'.+-+.-++-0*+-.+-.-+-.+-+-.-+-.-+-++*.-++-+-.++.-.++-0-++-+-+-++-+-++-.+-.+-+-.-+.+-+.-++-++-++-.+-/*-+-/-++-.-+.-.++11111%++ 11111-++-+-.-+-+-++-.+-.+-.++-.+++-+.-+-+-.-+-.++-++-/*-+++-.-+.*+-++-.+-++-+-+-.+-+-+-.-+-.++-.-++-+-.++.+-+-+-.++-.++-++-.+-.+-++-+-+.+-++-+-.+-.+-+-++-/*-/,+-++-+-.-+-+-++++-/*-+-+-+11111 *+&11111++,+-++-.+-.-+.+-/-+.-+.-++-+++-.-+-.+-/*-/*-++.-+.++-++-+-++*-.+-+-.-+-+-++-.+++-+-+.-++-0-++-.+++-+-++,+-++-.+-.*' *-/*-+.-+-0-+-+-++-++-++-++-++++-.-/-+.-+-++-+-+-+-+-++-.+-.+-+-.++-++-++-+-+-+-+-+-+-.-.+-/-.-+-+-.*-.-+.-+++-++-+-&1111114111111+-+-++-++,+-.-++-++-+-+-++-.-++-+.+-++-++-/-+.-+-+.-+-+-++-/-.-+-+-+.-++.+-+-+-.+*+-++-/-++-.-+.+-+-+-.+-++-+-+-.-.-+-+-++-.+-++.-+-+.-+++-+-+-0*-.-+-+,-/-+.-+.*+-.+-.+-.-+-.+-.+++)111211))1111114+-/-.+-+-+-++-+-.-++-++-+.-+-.-+++-++-+-.+-++.-+-+-+-.+-+-.*-0-+-.++-+.+-.+-+-+--.+-+-+.-+-++-++-.-/+*.-/-.+-+-++-.  ,*-.+-+-+*-/++-.+-.+-+.-++-.+-.-/+*-.+-+.-+-.-++-+.-+.-++-++-.+-+-.-+-+-.-+.+++-.+-.++-++-.-++++-.+-/++-+-+-.-+-+-+.511111111111111&+.-+.-+.-/-++-+-.+-/+.-+.-+-.+-.-+-.+-.+-.-++-+-.-+-+.-++-.-++++-+.-+-+-+-/+.-++-/-.+-+-.+-++-+-+-+.-++-.+-.+-++-+++-.+-+-+*-0-+-++*-/*-0-+.-++-+++-+.-/*-++-++-/-++-++-+-+*-+-++-.- 111111111111113++-++-.++-.+-0++-+-.-+-.+-+-++-+-.-+-.*-+-.-+-+-+.+-++-0++-/*-/++-.-+-+-++-+.-+.++-.+-+-+-.+-.+-+-.*-/-+-++-+.+-+++''''++-+-.++-0*-.-++-/*-0-+-.-++-+-+*-/-+-++-+++-+.-++-/*-/*-0*-/+-+++-+.+-+++-+-.-++-++--++-+-++-.-++-+-+-.++-+++-0+.-+-1111111211111--/++-/*-+-+.-+.-+-.-+-+-+-++-+-+++-+-++-/*-.-+.++-+++-+.-/*-+-.-++-++-.+-.-+-++-.-++-+.+-/,+-.++-.+-++-++-++-.+-+-+-++-.+.-/*-.++-0-.-++-++-+.-+-.-++-+-.+-.-+-.-++-.+-/+.-/.+-.-+-.+1111111111121+-.-+-+-+-++-+-+-+.*+-++-+-/.+-.++-0++-/++-++-.+-+-+-.-+-.-+-.+-.-++-.+-+.-+-+++-+-++-.-+++-+-+-.++-0*-/*-.-+-+-.-+-(((((((((((((((((( +-0++-+-+-++-++-.-++-++++-+-++.-/,-0*-.-+-.-++-+.-+-.+-++-+-.-+-.-+-+-.+-+-.+-/*-0+-++.-.+*.-+-++-.+-.+-+-.-+-+-+-+++%111111111111+*-.-+-+.-++-++-+++-+-++.-++-.++-.-+.-+-+-.++-+-+-.+-.-+-+-+.+-+-.-+.-++-+++-.+-++-+-.-+-+-/-+-+-+-+-+-.+-.+-++-.++-.+-+-+-+-++-+-+-++-.-+.-++-++-++-.-++-+-++-++-.-++-.-+-+-+-++-++-+)111111211111%*+-.+-.+-.+-+-.-++-/-+.-++,-+-+-+-+-+-+-.-.+-++-+.+-+++-++-+-+-+-++-++-+-+-.+-+-+-.+-/++.--.+-++-+-+-+.-.++-.+-++-.+**-+-+-.+-+-.+-++-.-++-.-+.-+--+-++-+++-.++-.-++-+-+-+-.-+++-+.+-+.++-+-.-++-+-.-+-.+-+-+-/-+-+.-++-++-++-++-.+-++-.-6111111111111 +-+-.+-+-+.-++-+-.-/.+-+-+.-+-+-+-++-+.+-+-+-.+-+-+-+-+++-.-+-.+++-+-++-.-+-++-+-.++-++-+-.-++.-+.++-.-+-+-+-.-+-.-++-.++-+-.-+-.+-.+-++-+-+.-+-+.+-+++-+-+.+-.+-++-+-++-.+-+-.+-.+-++ 1121111111113/-++-++-++-.+++-.-+-.+-+-/-+-+++-.+-.+-+-++-.+-.-+-.-+-.+-+.++-+.+-.+-.++-++-.-.++-+-.-+-+++-.+-+-.+-+-+-+-++-.-+++-'.+-.+-++-+.-+-.+-++-.-+-++-/.+++-.-+-.-++--++-.-++.+-++-.-.-++-+-+-+-0++-.+-.-+++-++-.-++*-0++-+-+-.+-.+-.+-++-.+-+*+%111111111211-*++-.++-+-+.-.++-+-+-.+-+-++-+.-++-.-+-.++-++-.+++-.+-.-+++-++-+-.+-.-+++-.+-/.+-+-.+-+.*+-+-+-+-+-++++-.+-++-++-.+-+-.-+.++-.++-++-.+-.+-+-++.-+-.-+-.+.-+-++-+.-+.-+-++-.+++-++-/+-)111111111111%*/+-.+-/-.-+-+-+++-++-++.-+.+-.-++-++-+.+-+-+-+++-++-+-+-++-+-.+-+-+-+-.-.+-+++-+-0*-++-+-.-++-+.+-+.+-++-.+-/*+-0-+ *-/*-+.-/+-++-+-.*-/*+-+.-+-+-.-++-++-++-+.+-++-.-+-.+-+++-+.-+-+.+-+-+-++-+++-.-+.-/++-0-+-+-0*-++-+-+-++-.+-++-.+6(111121111111113+-+-+-.+-+-+-+-+.+-++-.++-.++-+.-++-++-.-++-++-.-++-++-+-.-+-.-++-+++-.-++-.-+-+-++-.+-/-+.+-+.+-.+-.-++-.+-.+-++-+-++-+-+-++-+-+-+*-/*-+.+-+-+-++.-++-+-+-.-++-++-+.+-+-+-.-+-.-+3111111111111113*+-0*-+++-+-.-+-.*-0-+-+-/-++-+-.+-+-+-.+-++-.-++-.+++-.-+-++-+-.+-++-++-.-/-+-+-+.+-.+++-+-+-+-+-+-.+-++-.-+-+-+++*-+.-+-.-++-0++-/*-0-++-+.-++-++-.+-.+-.-+-.+-+++-++-+-+-++-++.-+-.++-.+-+-.-++-+-+-.-+-.+-++-+.+-.*-+.-+-+-+.-/+ 11111112111111111%*+.-++-.+-++-.-+-.+-+-+-+-0-++-+-.++-+-.+-.-+-+-+-.+-.++-0++-.+-+-+-+-+-.-++-++.-+-+-+-.+-+-+-+-+-+-++-++-++-+-.-+.+-.++-.+-+-.+.-/+-.+-+-.-++-+-+-+-+-.+*+-.-+.-+-+-.+-++-+-+++%11111111111111111!*+-.+-+-.+++-.+-/*-/*-.+-.+-.+-+-.++-++-.+-/*-.-++-.-++-.+-+-+++-.+-++-+-.-++.+-+-+-+-+-0++-.+-.+-++-.+-+-++.-++- '.+-+-++*-.+-+-+-.-++-+.-/*-++-.+-++-++-++++-+-+.-+-.-+.+-.-.-+-+-++-+-++-.++-++-.+-++-+-++-.+-.-+-+-/++-+.+-0*-+-)1111111111111111111168+-.++-.+-+++-++-/.+-.-+-+.-/++-/-.+-+-/++-.++.-+-+-+-+-+-++-.+.-+.++-++-+-.-+-.+*+-++-+-.++-++.-++-.+-.+-.++-++-+-+-.-+-.++-+-+-.-+-0++-.+-.+.-+.+-++-/-+-+-+-.+-++-.+-++.+6(11111111111111111111)-+-.+-++-.-++-+-.+-++*-++-++-.++-.-.+-++-.-/++-.-+-.+-++-0++-.-++-.+-0+*+-.-+-.+-+-+.-+-.-++-++-+-.-+-.++-+-+.-+ *-0++-0-++-.*-++-+-.-+-+-.*-.-+-.+-+.-+-.--.+-+-+-+++-/-++++-.+-.+-.*-.-+-+-.+-++-.+-++,+-++-+-++-.+-.-+-+-+-++51111111111111111111111 ++-+-++-.-+-/,-+-+-++++-+-+-.-+-++-++,-+-++-+-/++-.+-++-.-+-+-+-+-+-.+-.+-++-++-0-.+-0++-+-.-+-+.-+-+-+-+-+-.+-+-+++-+++-.-+-+*-++-+-+-++-++--+-+-.+-.-++.+-+++-.+-/+-.-+-7211111111111111111111115++-.*-/-++-0*-+-.-0-+-.-+-+-+-+-++-.+-+-.-+-/++-++-+.-+-.-+-++-+-+-+-/-+++-++-+.*+-+++-.+-+.-/.++-++-+-.-++-+,(,*-+-+-++-+-+.+-.++-++-.+-/++-+-+-+--++-++++-.+-.+-+-.-+.-+-++-++-+-/++-++-+-+-.-++-.+-/-.-+-+.+-++-+-+.+-+-/+%11111111121111111111111111)-+-+.-++-.+-++-.+-+-.-+.-++-.+-.-/*-/-.-+-.-+-.-++-+.-++++-++-.++-++-++-.+-.+-+-++-+-+-.+-++-.+-+-+.+-/.+-++-.++-.-+-.-+-+.+-0++-.++-0+-.+-+++.-/*-/*-.-+-+.-+-+-.-+-+/-%11111111111111111111111111%+/-0*-0+-+-++*-++-+++-.+*+-+-.+-+-+-++*+-.+-.-++-.-+-++-.+-.-.+-.+-+-.*-0-+-.+-/-.-+-+-+-+-+--+-+.-+.-+-.-+-+++-.+-.+-/.+-+-+-+-.+-++-+-.-++.+-.+++-.+-.-++-++-.+-+-+-+-0+-+.-++*-+-+.-.+++-++-+-+-+-++-+.-+-.+-++.-/-.+,-(11111111111111111111111121127/+-+-.+*-+-.-+-.++-/*-++-++-++*-.+-++*+-++*+-.+-.+-++-.-.+-++-.-+-+.-++-+-+-.+-+-+.-++-.+-++-++.-+-+-+-.+-+-.-/++-++-++-+-+-.-+-+-+-+-+-.+-+-+-.+-+++-+-+-+-.++-+-++322121111121111111111111211216+-+*-+-.+-0-+.-+-.-++-0-.+++-.++-0*-/-++-+-+.-+++-++-++-+++-+++-.++-/*-/*-+-+-++-.+-++.+-++.+-+-++-++++-.+++-/*-++-.-+-+-.++-++-+.-++-+-+-+-++-.-++-+-++-.+-++-++,+-++-.-+-+-0-.-.+-++-.-+.-+.-+.-+.-++-++-+-.-+-+-++-/577"57777577)11111137"577777775+-0++-/-.+-++++-.-+-.+-.-+-.+-0-+-.+-0-++-0-++-+-+-.-+-++-.+-+-.++-+-+-++.-++-.++-+-+-++-.+-.-+-++-.+-++-.++-.-+-.+-.+-.+-++-.++-.+-++-++-.-+*-+-.-+-.++.-++-+-.+.+-377777775777(111111777777777776++-0++-+-+-++-+++-/*-+-++-.-+-.-+-+.-.+-.-/+-+-.-+.-.+-+-+-+-.-+-.-+-.+-.+++-.+-++-.+-+-.+-+-.+-+-.+-.-++-+'**-.+-+-++-0++-/-.+-.-+-.-++*.-+-.-+-+.-+-.+-+-+-.-+.-/-.+-+-++-++-+++-+-+-+-++-++-++-++-+.-++-.+-++-.+-+-+-.-++.-++-.-+3111111&*-++-.-++-.+-+-+-+-++-.+-.-++-++-+*-+.-+-+-++-+-+-.+-+-++-+++-++-++-+-+-.++-.-++-.+-+-++-+-+-.+-.+-+-+-/++-.+-++-.+-+-+-+++-++-++-++-.+-+-+-++-.+-.+-/++-0++-++-++-+-+.-++-+-+-+-+-+-.+-.-+- 111111 ++-+.-++-++-.-+-.-+.+-.+-+-.-+-.+-++-+-+++-++-+-++-++*-.-++-+-+-+-/.+-.++-+++-+-+-+-+-.-++-.+-+-+-.-+-+-++-+.-+-+-++-.- .+-+-+.*-/*-+-.-++-+-+++-.+-/-+.++-++-+-+++-/.+-++-+-+-++-++,+-+.-+-+-++.-.++-.-+-+.-+.-+-+-.-++-.+-++-+.+-++-+-+-.-+-++-111116.++-+-.+-++-.+-.+-.+-/*-/-++-+.-+-/.+-+++-.+-.+-++-.-+-.-+-.-.+-.+-0++-+-+-+-.+-++-.+-.-+.+-++-++-.+-++-.-++-.+-+-+-++-.+-.-+-+.-+.-++-.++-.+-++-/*-.-+-+-+-.+-.+-.-++-+.-+++-.+-++-++-+++-.6111112++-.*-++-+.-+*-++-+-+-++-.++-+.-+-.+-.++-.-+.-+.-+-+-0-+-++-.+*+-+.-+-+-+-+-.-++.+-.+-+-.+-++-/.+-++*+-.+-.++-++-.+-+-+**-/.+-/-.-++-++-.-++.-+-++-.-++-+-.+-.++-.-+-+-.+-++.-+-.-+-/-.-+-.+-.-+-+-+-++-.+-+-+-+.+-++-+-++-.+-.-+-.+-+.+-/++-.+-+)1111++-.-++-+-.-++-++-++-.-++-.+-.-+-.+-+-+-.-++-++-.+-+-++*+-.+-++-++-+-.-++-+.-++-+.-/*-+++-+-.+-++-++-.+-+*-+-++-+.+-+.-/*-+-+.-+-+-+-+-+-/-++-.+-.-++-.+-.+-++-++-+-+.-+-+-.-+-+-+.-.+-.-+-++.1111)+-++-+-.-+-+-0++-++.+-+-+-+-++-++-+-+-+-+-++-++-+.-++-+++.-++-0-++-+-+.+-.++-.+-+-++-.++-+-.-+-+-.+-0-++-+-/-.+-++-+.+-++*-+-.-++-.-+.-+++-+-+.-+-++-.-+-++-+-+-++-.+-++-.-+-++*+-.+-+++-++-+++-.++-.+-++-.++-.-+-.+-+.+-+-+-+++-++-+-+-.-+-++-+.511114+-+-++-.++-++-.+-.--++-.-++-/++-++-.-+++-+-.-+-++-++.+-/-++-++-+-.-++-.+-.+-++-.-++-.+-+-.-++-+.-.+-/*-.-/.+-.-+-+-.+-+-+-.++-++-.+-.+-.+-+.-+--++-.-++-++-.+-.-+-.++-+.+-+++-.+++-++-++-.+-+-&1111 +++-0++-.+-++-+-.-+--.+-.+-+.-++-.+-.+-.+-+-+.-++-+.-+-.-+-.-+-+.-++.-+-+-+-++-+-.+-+-+-+-++-+.-++-+-++-.-+-++-+.-+-+-.+'.+-++-++-++-+-++--.+-+-+.+-+++-.+-+-.+-.+-++-.+-+++-0+-0-++-+-.-++-0*--+-+-++-+.-+-+-+++-++-+-+-+.+-+-.-+.-+.+-++-.+-.-+-+1113++-.+-+-+-+-.-+-/++.+-++-+-+-.-+.-+++-.-++++-.+-.-+-+-.-.+-0+-.++-++-++-++-+-.-++-+-+-.++-++-.-+-+-.-++-+-+-++-.+-++-+-.++-/-.+-++-++-++-+-+-++*.-++-+-+.-+-++-+++-+-.-/-.+-.-+-.-+-++-.++-+.+51111*-.-+-+-++-.+-.-++-.+*+-++-.-+-.-++-++-++-.+.-+-.-++-+.+-+-+++-.-+-+-+-++-.+-+-.+-+-.++-.+.+-.+-++-+-.+-/++.-+-++-+.+-++- *-0*-.+-.+-.+-+-.++-.++-+-.-+-++-0+++-++-.+-+-+-.-+-+-+-++-.++-.+-+-+.++.-.+-.+-+++-.-+-.+-+.+-.-+-0*++-+-+-+-.+-++-+++-++411++-++-0++-.+*+-++-.-+-.+-+.-++-++-+-.-+-.+-.-++-++-.+-/*-+-+--+-+-+.-.+-+.-/++-++-/,-++-+-.+-++-++-++-.-+++-.+-++-.+-.++-.-+-++-+.-++-.+-.+.-+.-/-++-+.+-+-++-.+-.-++-++-++-+-+++-.+-.-+-+-+-+-+11+++-++-.+-++-+++-.++-/-.+-+-+++-.+-+.-++-+-+-+++-+.-+-+-++.-+-++++-.+-.+-++-.+-+-.++-+-+-+-+-+-+-.-.++-+-.--+.-.-+-+-.+-+(,*-++-+-+-++-.++-+-++-.-++-.+-.-+--.-+-.-+-++.+-++-+-.+-.-+-+-++-.-+-+-+-+-+-+-+-.-+++.-+-.-+-+++-+-+--.+-.+-++-.+-+-.-+.-7114+-0*-+-+-++-/-.+-+-+-++-.+-+.-+.-+-+++-++-+-++-.+-++-.-+++-+.++.-++-+-+-+-+-.-++-.-++.-/-++-0+-.+-.+-++-.-.-+-.+-++-+-+-++-.+-.-+-+.-++-+-+-+*-+-.+-.-+-0++-.-+-++-.-+.-+.-+++-.-+-+++-++-.+.-+.&11&+--.+-++-.+-.-+-+-+-.-++-.++-.-++-+-+-.-+.+-+-.-++-+.+-++-+-.-+-.-++-++-.+-++-0++-+-0+-+.-+-.++-+++-+-/,-++*+-++-.+-++-0+'++-.-+++-.+-+-+-+.-+-+-++-++-++-++++-++-++-.-+-++-.+*+-+++-+.-+-+++.-+.-+++-.+-++-++-+-++-++-+-.-++-.+++-++-.-+-+-+.-+-+-+-213++-+.-+.-+-.-++-.+++-.-+-+-+-++-+.+-+-.+-/.+-+-+-.+-+-+-.-++-+-+-.-+++-.+-++-.+-+-+-+-+-.+-+--++-/*-0*-+++-+++-+-+-+++-.+-++-+++-.+-+--.+-++-0+-++-++-++-+-+++-+.-+++-+-+-+-.-+-+++-0-+.-+-+-+*-611-++*+-.-+-+-+++-.+-++-++-+-+-++-+-+.+-+++-+-.++-+.-+-+-.+-.-++++-+-+-.+-+-+-.-+-+-++-+-.+-+++-+-.+-+-+.-+++-0-++-++-.+-+-*+-/++-0-++-.++-.+-+.+-+.-.+-.+-.+-.-++-.+-++-+-.-++-0-+-.-++-+.-+-/-++-+-.-++-.+-.+-.-++-.+-.++-+.-++-/-.+-+-++.-++-++*.-+.)2++-.-++-++.-++-.-+-.-/++-++.+-+-.-+-.-++-.-+-/.+-++-.++.-+-.-+-+-+++-.-++-.+-++-.+++-.+-++-/.+*+-.-++-/.-+-+-.-+.-+.-.-++-.+-+-.-+-+-+.++-.+-+--.+-.+-.+-.-+-0-++-+-.-++-.+-++-++-.-+-++-++-++-0*-).+-0-++-.+-+-.-+-.++-/,-+.+-.+-++.-+-.+-.-++-+-.-+-.+-++-++-+-.-.+*.-+-+.+-++*+-.+-0*-++-+-.-+.-+-.-++-+-.-+-.+-.-+-+-+.+-)**-.-+-++-+-+-++-+-+-++-+-+-+-++-+-+.-/*-.+-+.++-.-+-++-+-.-++-++,-++-0++-.+-/*-/-++-+.-++-+-+-.+-++-.-++-+.+-+-+.-++-/-++-7)++-+-+-.-+-++-++-++-+-.-+.-+-.++-++-++-+-++-+-+-+-+-+-+-++++-.+.+-.-+-+.-++-+-.-+-.-++-.+-.-+-0-++-.-+--+.-++-++-++-+-+-+-+-.++-+++-.+-+-++-+.+++-+-++-+-+++*-+.-+++-+.-++-.+-+.-+-.+*-.-+-.+-+-++%&/-+-++-++-.++-/++-.-+-++-/-++-.-+-+-++-+-+.-+-+++-++-.+-.+-+++-++-/-++-+--.+-0-++-+-+.+-/++-++-+++-.+-++-++-++-++++-.+-+-+.+-++-.+-+.+-.+-++.-+.-+-++.-++-0++-++-.+-+-+-+-+++-.+-+.++-.-+.-/-.-+-+-++-+-.+-+.-++-/*-/.+-++-+-.-+-+-+-+-.+-+-+.-.-++-+-3/-.+++-++-.+-.+-.+-+++-++-+-+-+-+.-+.-+.-+-.+.-+.+-.++-.+-.-++-+-++-+-+-++-.++-+++-.+-/*-+-+-+-++-++-+.*+-+.-+.-+.-+-++.+-++-.-+-.-++-+-.+-.-+-+-.+-.-+.+-.-0-+-+-.-++-++-++-.+-+++-/-++-.++-.-+-+3--+.-+-.+-+-+-.-+-+-+.-+-.-+.-/++-.+.-+-.++-+.+-+-.+-+-+-+-.+-.-+-+-.+-+.+*+-+-++-.-+-+-+-.-++-.-+-++-.-.++-.+-.+-.-++-+-+,'*-/,-++-.-+-++-.-+-++-+.+-+-+.-+-+-.-+-+-++.-+-.-+-++-.+-+-++-+-+-++-++-.+-.+-+-.+-+.-+-.+-+-.+-.++-+++.-.+-++-.+-+-+-+.-.+-+-++-.-+.-+-+-+-++-.-.-+-.-+++.-++-/*-/*-+++-+-+-+-++-.-+-+-++-+-.+-.+.+-+-+-+-+.-+-+-+-.+-++.+-.-.+-.+-/-.+-/*-+-+-+.+-+-.+-+-+++-.+-0++-+-++-.-++-++-+-+-++-++,+-++-.-+-.+-/+-+-.-+-.+-++-+-++.+-++++-+.+-+-.++-++-.-++-++-+-+-+-.-+-+-/++-+-.-+-.+-+-.+-+.-++-+-+.+-++-.-+-0-+-.+-+++.-+.-+-.+-++-+.-+-++-+-+-+-+-+-++-0++-+ +*-++-+-++-.+-+-++-.-+-+-.+-+-+-.+-+-++-.-+-+.++-.+-+-+-+-.+-.++-.+-.+-++-++-++-+-+--+.-+-+-++-+-+-.+-+-++-.+-/*-0*-+++-++-.+-.-+-++-+++-.+-.-+++-+++-+.-+-+.-+-.+-.+-.-+-++.-+.-+-+++-.+-.-++-++-+-+.-.+-.+-+-+.+-+-.++-+-++-+-+*-+-++-+-.+-.++-+-.-++-.++-.-/*-+-+-+.+-+++-+-.+-.++-.+-++-/-.+-+-+.-+-.-+-+-++-++-.+-.-+.-+-.+-.-+-+-+++-+-.+-++*.-/.-++,+-++-++-++-.-+-+++-++-.++-+++-++-.++-+-.+-/++-+-+++-+-.-+-++-+++-.-+-.+-+.+-++-0*-++-.+-.-+-.-++(.+-+-+.+-+-+-.++-.++-.+-++-+.-+++-.++.-+++-++-+-++-+.-+.-++-+-+-++-++-.-+-.-+.-++-.+++-++-.+-+-.+-++-.-+*-/+-.-++-+.+-.-+-+*-/*+-+.-+-.-++-+++-.-+-.-++-+-.+-+-+-+-+-++-.+-+-++-/++-.-++-/++-.-+-+-.+-++-++-++.-+-.++-.-+-.*-+++-0+-.+-.+-+-++--.+-+-+-+-+-+-+-++-+-.-+-0-+-.++-++-+-+-+-.-.-++-.+++-+++-+-.+.+-.+-++-+-++-+-++-+-++.-+-.-++-+-.+-/-+--+.-/-.+-+.-+.-+-+.+-0-++-+-+-+-0-+-.-+-.-+-+-.-+-.++-.-+.-++-+.-+-.-++-+++-+-+-.-/*-+.+-++-+++-+-.+-*-0+.-+-.+-++-+-+-+-++-+.-+-++,-+-+-+-+-.-+.-+-+.-++-++-++-/.+-.+-.+-++-++-++-/,-++-.-++-++-.+++-.+-++.-/,--++-.-+-+-+-+.+-/*-0-++-+++-++-.-+-+-+++-+.-+-++-++.+-++-.+-++-.+-.-+-.-++-+-.-+-++-.+-++-++-+-.-+-+-++-+-+-.++-0+-.-+--++-/*-+++-.+++-++.+-.+-++.+-.-.+++-++-+++-+-+-++-.+*+-++-+-+-+-.-+-.-+.++-+-+-+.-++-.+-+-.+-.++-+-+++-+.-++-+-.-+++++-+-++-++-++-+.+-+-+-.+-0++-.-+-.+*+-++-+.*+-++-+-+-+-++-++-0+-+++-++-.+-.-+.-+-+-.+-/-+.-+-.-+++-++,*-+-+-++-.+-.+-.+-+.-++-+.+-/-+-+.+-.++-++-/.+-+-.-++-.+-.-+-+-+-+-.-++.-++-.-+-.-+-+.-.+-+-+-+-+-+-+-+-++.+-++-.+-.+-+--.-++-+.-+-.-+.-+++-.++-.-++-/.+-.-+-+-.+-++-+.-++-++-++-++-.+-++-.+-++-.+-.+-0+*+-.+-.+-+-.++-+-+--++-++,+-+-.+-0-+-+--.+-+-++-0+-+-++-+-+-.+-.-.-+-.+-.-++-0-++-++.+-++-.++-++-+-+-.+-+-+-.++-.++-+-+-.-.+-.-++-/,-0*+-+-.-.-+.-+-.-+-.-+-+-.+-+-+-+-+-++++-+-/-.+-.+-/-+.-+.+-.-+.-+-.-+-+-.-++-++-+-++-++*.-+-+-.+-+++-+.-+-.-'++-++-.+-++-++-++-0+-+.-+-+-.-+.+-+-+-+-+.-+-+-.++-+.-+-+-++-+.*+-+-++-/-+.-+-++*+-++-+-+-0++-.-+.+-.+-+-.-+-+.-++-++-.++*+-.-++-+++-++-+-/-+-.-++-.-+-+-++-.+-++-+.-+-+-+-.+-.+-.+-++-+.-++-0+-++-+-+-+-/-++-++-.++-+-.+-++*.-+.-/-.+-+-+-++-.+++-+-.+-+-+-.-+-++.-++-+++-/++-.++-.-+-.+-.+-+-.-+-+-+-.-+-.++-+.+-++-+-+-+-.+-++-++-/*-.-+-+*-/-0++-+-+*-+++-+.++-.+-++-.+++-.+-.+-.-++,-/+-++-+-.+-+-+-++++-+++-++-++-+.-.+-.-++-.+-/-++-.-+-+-0-+-+*-/+* +-0*-++-0+-+-.-+-+-+-+-+.-++-+-+-/+-+.-+-+-.+-/*--.+-/++-.+-.+-/-.+.+-.-++-+-+.-/-.+-.+-++-.-+++-+-++-.+*+-+-+-++-.+-+-+-0-++-.-+-0-+-.-+.-.++-++-++-+.-++-++-/.-++-/,-+.-++-+-+-+-+.-++-+-.-+-.+-.+-.+-.-.*-0+-+-+-+-++-.+-/-++-+-++-++-.+-.++-.-/.-+-.++-++*.-+-+-+-.-+-+-.-+-/-++-++-+-+-.-++++-+.-++-++-+-.-+-.+-.-+.+-++-.+-/*-+-0++-.+-/*-+-+-.++-0+-.-++-+-++-++-++-.-++-++-+-++-/-+-.-/,-/*-++.-++-.-+-.-+.-+.-+-+-+-+++.-++-.-+.-++*+-++-+.+-/,--.(**-+.-+-+-.+-++,+-+-.+-+-+.-++.+-.-++-+.+-++-.-++++-+-.-++-++-+-++-+-+-+.-++.+-+-++-++-.+-+-.-+-.+-.-++-/-.+*.-+-++-+.+-+-.+-++-.+-+++-++-+-+-+.-+.-++-+.-+.-+-+-.-+-+++-++-.++-.+-+-+.-+++-++-+-+-+++-+++-/*--++-.+-.+-++-.-+.-+-+.-+.-++-+-/-+-+*-/*+-+-.+-/-+.+-.+++-.+-++-++-.+-.+-+.+-++-+-.-++-++-+.-+-+++-++-+++-/-+.-++-.-.+-+-+-++-.-+.+-++-+-+--++-.-+-+.-+-.-+-+-+-+-.-+.+-/,-+*-++-++-++-+-+.-+-++-+-+-++-/.+-+-.-+-+-+-++-+-++-0-+.-+-+-.-/+++.+-+-++,-++-++-/-+.++-.++-+-+-+-+-+.-+-+-+.-++-.-+-+.-+-+-+-.-+-.-+-++.-+-+-+-+-.+-.+-+-+-++++-++-++-+-.-++-/-+.-+-.-+-++-+-.+-++-+-.-+.-+++-.-+-+-+.-++-+-+-.+-++-.+-/-.+-+-+-++-.+-+-+-.-++-.+-+.-+-+-.-+-.++.-++-/+-.-++-++-++.-+-+-++-.++-.++-0*-/-.+-+-.-++-+-+-.-++-.+-+.-/-+-+-+-+-.+-.++-.+-.+-.+-/.+-.-0+-.-+-.-++-+-.-++-/,+-.+-+-++-+-.+-0*-.+*.-++-+.-+-.++-.+-.+.+-++-+-.-++-0++-.-+-.-.+-+-+-.+-.+*+-.-+-+-++++-+.-+.+-+.+-.-+-++-+.+-+-+-+-*'*-/.+-/-++-.+-.-++-+-+-.-++-.+-/*.+-/.+-.+-+-+++-.-+-++*.-++-+.++-.+-+-++-.+-.++-+-+-.++-.+-+-.+-.+-++-+-+-.-++-+.-++-+.-++-+-.+-.++-++-+-.-++++-.+-+-.-+.+-++-.+-++-.-++-.++-.+-++-.+-++-.+-++-++-/,-++-+-+-+--++-.--++-.-++-.-+-++-.+-.-+-+-+--+-+.-+*-+++-+.-+-+++-+-.-+-.*-+-++,+-.+-++-+-+-+-+-+-++-+-+-+-+-+-+-++-+.-/++-++-+-+-++-.++-.+-++-+-+++-/-++-.+-/++-+-++-++-+-.+-++-+-+-+-+-+-+.+-++-.+-+++-++-0-++-.+-.+-0-++-+-+-.-+-+++-+.-+-+-.+*+-.+- +*-+-.-+.-+-++-+.-+-0++-.+-++-.-+--+-+-++-/+.-+-++*+-.-/-+.-++-+-++-.-+.-++-+-+-+.-++-+-++-.-++-++-.+-.+++-+-.-++-++-.+-+.-++-+-+-+-+.-+.+-++-.-++-.+-++-+-.+-++-+-.-+-.-+-0-++-.+-++-.+-++-.-+-.-+-++.-++.+-.++.-+++.+-++-.-+++-.+-++-+++-+-.++.+-+-+-0+-.-++-+.+-0-++*+-++-/*-.+-/-++-0*-/++-.++-.+-.-+-.+-++*+-.++.-/*-+-.-++-.-.++-.-+-.-+-.+-+-.-+-+-.+-/*-+-+-.+-.-+.-+-++-+.-.+*+-.+-+.+-+-++-++-.+-.-+-+-++-++-++-+-+.-/.+-++-++-.-++-+.+-/*-0-++-.(.+-++-++-++-.-++-++*-+-++-.+-+-+++,+-+-+-.-+-+-.+-0-++*-/+-+.-+-.+-+-++-/*-0++-.+-++-.+.-++-+.-+-.-+-++-.-++++-.-+.-++-++-+.-++-+.+-+-+-+-+-.-+-+-++-.+-.-++-.+-.++-++*+-++-++-+--+.-++-0*-+-+.++-.+-/-+.-+-++-+-+-.-+-.+-+++-0-++-+.-+-.-+.+-+-+-.+-++--++-.-+-+-+-+.-/-.+-+-.++-.-+.-+-+.-.-+-+-++-+++-++-.+-0-++-+-+-.+-+-+.-+++-+-++-++-++-+-.+++-.+-++-.-+.-+.-+-+++-+-.+-+-+-++-0-++-.+-+-.-+-.+-++-+-+.+-.+-0*-.+-.*-+-+-+-+-+.+-++-.-+-+-.-++-.+-++ *-0*-+.-+.-++-.-+-0-+-.+-++-.++-.-/-.+.+-++-+.-+-+-++-0-.-++-++-+-.++.-+-.+-+-++-+-.-+-+-.-++-+-+++-+.-+-.*-0-++-+-+-+-.-++-+.-++--+.-++-.++-+++.-+-++-+++-+-+-+-+-+.-/-+.-+-.-.+++-/*-+-+-.++-+-++-.-++-+-.+-.-++-++-/*-.-+-+-++-.+-+++-++-+-.+-++-.+-+.+-++-.+-.+-+-+-++-.-+-+-+-++-++-+-+-+++-.+-+-.-+.-/*-+-+.-+-.+-+-.+++-+-.-+-.+-.+-+-.++-+-+-++-.+-++-+-++-+++-.-+++-+.+-.-+-+-.+-++-+-+++.-+-.+-0++-+-/*-+-+-+-+-/.+-+.-+.+-+-.-+++-.+-++-+-++-.*-(,*-++-+-/-++-++-.+-+++-+-.-+-+-+-+-++-+-.+-.+-/++-.+-+-+*-.-+.-+++-+-+-+-+-+-.+-.+++-++-++-.-+.+-.-++-/++-/*-++-++.-+.+-+.-++-+.-+++-+.-+-+-+.-+-+.-+-+-.-/.+-++.-++-+-.+-++++-+-.-+-+.-+++-.-/-.+-+*-.-+-++-+++-.++-.-+-++.-+.-+-+-+-.-+.-+-++-.+-++-.-+-.+-++-++-.++-.+-++++-+.-++-.+-.+-++-.-++-0++-++-+-/.-++-/++-+.+-+-.-+-+++-++-++-.++-.-+.+-+.-+-.+-+.+-.-+.-+-++-.-+-+-++*.-++-+-.-+-.+-+-++-+-+-+-.-+-+.-+.*+-+.-+-++-+-+-+-+++-.-++-.+-+.-+-+-/+'++-.-.+*-.+-.+-++-+-.-+.-+-++-.+++-.-+-++-+-+*-.-/*-+.+-/++-+-+.-+-+.-++.+-++-+-+-+-.+-.+-++-+--++-.-+-.-+-0+-.+-+-++--+-+-.-+-/*-.-++-+-.+-+-+-.+-+.-++-+-+-.-+-+.-+.-+-+--.-+++-.+-+-+.-+-++-++-.-/++-.++-+-.-+-+-+-+.+-+-++-+.+-0++-++-+.+-+-+-.+-++++-+-.+-.+-+-+-++-.+-.-++-+.-+-++-+.+-++-.-+-+-+.-+-.-+-.-+-.-+-+-+++-++.-+-.+-0+-+-+-+-++--.-+-+-+-+-+-++-+-+-.+-+-++.-+.-/-++-.++-.+++-.-++-.+-.+-+++.-+-++-/-.+-+*-.-+++-.+.-+-+-+.-++-.+-+.-++-,+-/++-/-+-+-+-+.-+++-++-+++.-++-.-++-.+-+-+.-/*-+-+.-+-.-+-.+-+-+-.+-+.-+-.+-0++-.-+-+-+-.+-++++.-++-++-+-+-+-+-0++-+++.+-++-.+-.++-.-++++-+.+-++-++-+.-++.-+++-.-+-+-++-+.*+-.-+-+-.+-+-+-.+-.-+-++-.-++-.-++-+.+-.++-+-.+-+-+-+-+-+-+.-+-+-.+-++-.-+-.-+++-+-+-+.-+.-+-+-+-+.-++-++-.-+-+-.+-+++-.+-+-+.*+-++*+-+-/.+-.+-.-+-+-.-+-+--.+-.+-+.-++++-++.+-.+-.+-+.+-++-+.+-+-++-+-.+-+-+-++-.-+-.+-/*-++-.+-+-++-.-+-++-+-0++-.-.-+-+-.+-.+-+-+-+-++-+.-+-'**-.-+-.++.-+.-+-.--.+-+-.-+-.-+-.+-++-+.-+-+-+.+-+-++-++-++-.++-++-+-+-+-+-+-+-+++.-+.-++-.-.-+-++-.+-++,+-+.-+-.-+-.-+-.+-++-+-+-++-.-+-.-+-.+-.*-0+-+-+-+-.-++++-+.+-.+-/-+++-+.++-.++-++-+++-.+-+-++-+-+.-+-+-+-+-.+-+-.++-.+-++-.-+-.+-++-.+-/++-+-+-.-/+.-++-++-+.+-++.-+-.-/.-++-.+-+--.+--++-.+-+-/-.+-0-+.*-+-+-+-+-.+-++*+-.+*+-++-++-++-.-/.-+-++-++-+-+-.+-+-+-.-+.-/*-+-.++-++-+-+++-+.-++-+-+-.-+.-+++-.+-.-+-+-/++-/++-++-++-+-+.+-+.-+-+-++.+-++-++-+-++-++-++++-0++-+-+++-++-+.-/*-/.+-.-+-.+-+-.+-.+-+-+-.+-/.+-++,+-++-.+-+-++-++-/++-+-+,-++-.+-/-.+-+++-.+-++-++-.*-./+-.+-++-.-++-++-+-/*--++.-++++-+-.-++-+-+-+-.+-.-+-+-+-.-+.-+-.-++-.-++-.-++-/.+-+-.+-+-.++-.-++-.+-+++-++-/,-/*-+-+-.++.-++-+-+.-+.-+-+-.-+-++-++--+.-++-0++*+-+.+-++-.++-++-+-++-/-.-++-.+++-+.-/-++-/-.+-/.-++-+-+*-/-.+-.+-0++-++-/.+-++-+-+-.++-+-.-+-.++-.-+-+-.-+.+-+++-++-.-++-++++-+.-+-+-.-.+-.+-/.+-+-++-+.+-+.-*-/,-+.-+-.+-.+-.+-.-+-+-+.+-+-.+-0+-+-.+-+-/++-++-+.+-+-+-+.+-++-.-+-.+-/-.+-++-.-++-.+-.-+-/+.-/+-+-+-.-++-+-.-+-.++-.-++-/*-6-++-+.-++++-0+-0*+7+++.-+-.-+-+.-+-.-+-++.-++-+-.++-.++-++-++-++-+-++.-+++.-+-+-.+++-.++-+-+-.+-++-.-+-.+-.-++-.+-.+-+-+-++-.-++-+-+-.+-+++-+.-++-.++-++-+-+-0-++-+-.-++-7++-.+-.-+-+++.-++- /-+-+-.+-.-++-.-+-.-+.+-/*-++-+-/*-.-++-.-+-.+-++.-+-.-+++-.++-+-++-.-++-+-+-.-+-.-+-++-.-+-.-++-+,-++-+-+-+-+-+-.+-.-+-+-.+-++*-++-+-.+-+-+-++-+-+*-+.-+-.+-+-+--++-+-+-+-.-+.-+-+-++-.+-+-.+-++-+-+-+-++-.+-/++-.-+-++-.+-+-+--.+-++-++-.++-+++-+-++-.-+-+,523++-+-+-.-+--+-/!+-+-+-++-.-+-++++-.+-+-++-.++-+-+-+-.+-.-+.+-+.+-+-+-.-+-.+-++-+-+-+-.+-++-+-+-+++-++-+-+-+-+-++-.++-.+-+-+.-+++-++-.-+-.+-+.-+-+-.+-.++-+-/,-+-+++-++%*++-+++-.+-+-++53+-.+-++-++-+-/*-++-+-+-.-+.-+-+.-++-.-+-++-++-.-+-+++-+-.-+-.-/-.+-++*.-+.+-++-++-+.+-+-+++-+-.-+-/+.-+++-.+-.+-++-++-.+-++-/+.+-+-.++-+++-+.-+-+.-/.+-+-++-++-.+,+-.+-.+*+-++-+.+-+.-++-+.-+-.+-++,+-.+-.-+-.-+-+++-.+-++-.*-+.*+-.+-.+-+-+-+-.-+-.+-++-.+-/+1!,+*-.+-+++*+-14+.-+-.+-++++-.-+-++-.+-.-+-+-+-.++-++-/++-+-.-+-.+-++-+-++-.+-+-.++-++-.+-.+-+.-+-.+-++.+-.+-.+-+-+-+-+-.++-+-.-.+-/++-++-++-+.++-+-+-+-.+*-+-.+-.-+-.%1(68+-.-++-.-+*%1++*+-.+-+.-+.+-++.-+.+-+-+-+-.+-+-+-+++.-+-0+-+++-.-+-+.+-++-++-++-0+-/-+-+-.+-.+-+-+-.++-.-/+*+-+.-+-+-.-++-++-.+-+-.++-.+-+-,*-0++-+-+-.-++-++.+-+-+-+-+.-+.-++-/-++-++-0-+.-+-+-++-++-++-++-+-.+-/-++-++-++-+-.-+-++-+.-+-/++-/-++-+-+-.+-.+-++-++-0*-++-+-.&116*++-+-+-+7115+-/++*-.+-.-+++-.+-++-++-++-.+-+-.-+-+-.-+-+++-++-.+-+.+-+-/-+.-+-.-+-++-++-.+-+.-+-.+-+-++-++-.++-+.+-++-+-.+-++-.-+-.-+-.-+-+--.+-+.-++-0-+++-++-.-+6117*+-+,-+++-(114+-0-+-.-+-++--.-+-+-+-.++.-+++-+.+-.+-+-+.-+-.-+-++-+.-+-++-.+-.-+-+-.-++.-++-++-0+.-+-.-+-.*-/-.+-/-.++-+*-.+-++-.++-+-++-.++-,*-+-+-.+-+-.-+-+-+-.+-++.+-/*-++-+-.+-.+-+-++-++.-+.-+-.-.-++-.+-+-+-.+-.+-.+-.+++-.-+-.-/*-+-.-+-.+-++.-++-++-++-0+-+-+.-+-.*-62117+-.-+,+%111+.*-.-/-+-+-++-.-+-.+-.+-.+-++-+.+-+.+-+-++.-+-.+-++-0-+-.+*-.+-+++-.++-.-+-++-++-++-+-+-+.-+.-+-.-+-+-.+-.-++-++-++-++-+++-+.-++*+-++-/,-+-.+--.+-++++-111%*++-+-*71115+*-+++-++-.-+++-+-.+-++-+-+.-+-+-+-+-.-++-+*-++-.+-.+-/*-.-++-+++-.+-++-+-/+-.+-+-+-+++-+++-0*-+*-+-+-+-0+-+-.-+-/-.-+-.+-+-+-+++-.+-++-+.++-+.-+-++-.+-+-+-0+-.+-+-+-+-/,-+-.-/-+-+-.+-++-.-++-+.-++-+-+-++-++-.-++*+-++-.+.-++-++-.-+-++-+.-+.-+--.+-+-+++-/*-1111%-+*+6(11114+-/-++-.++-.+-+-+++-+-+-++-+.-+-+-+-+-+.+-+-+-++-.-/*-+++-/-++-/*--+-.-++-.+-+-.-++-.+-.-+-++-/++-.+-++-+-+++-.+-.+-+.-+-.-++-++-0-+.-+-++-++-+++-.+-.-+%11113*+++%1111+.-+-.-+.-+++-.-+.++-.+-+-.+-+-.++-+.+-+.-+-+.+-++-++-+-.++-+-+-.-++-.+-0*-.-+--+.-++-.-+-.-+-.+-0*-.+*+-+-0++-.++-+++-++-+.+-.++-/*-+.-/+-+-.+-+.+-+-+-+-.-+-+-+-.+++-+.-+++-++-.++-++-++-++-+-++-+.-+.+-+-.-+-+-++-0-++-+-+-++-.+-+++-.+-.-+-+-/.+*+-.+-.--+-.+%111116* 111113++-.+-+-+-++-+.+-+-.+-++-.-+-+.+-+.-++-/-.+-.+-+-++-.+-+-.-+.-+-.+.++-++-++-.+-+-.-++-++++-.-+-+-++-.+-.++-.-+-.-+-.+-/.++-.-+.-+-++-+.+-/*.-+.-+-+-+-++611111 86111114+-/++-++-+-.-++-+-+-+-.+-++-+++-.-+-+-++-/.+-+-.+-+-.+-+-+-/.+-++-+-+*-+-/*+-.+++-++-+-+++-++-+-+-+++-0-+-+-+-+*--.-+-.+-+-+-++-**-+.-+-.-+-++-+-+-.+-.+-++*+-+.-++-.-++-+-.-++-+-+-.+-.+-.+-+.-.-++-+-+-.+*+-.+-+.-+-.+-.+-++-.-+-.-+-+-+-+++-+.-+-/-++-/++.+-+-6111111111111+*-++-.++-+.-+-+-.-++-.+-++-++-+-/+-+.-.-++-++-+.+-+-+-0++-++-+-+-+-+-+.-+.-++-.+++-+-.+-.-++-.+-.+-++-+-+-+-++++-+-+-+--+-++-+-+*-.-+-+-.-/-++-+-++.-+.-+1111111111113/*-.-++-.++-++-.++-.+-+-.+-+-.-+-.++-+.-+-+-/-++-.++-.++-.+-+-.+-+.+-/*-.-+-++-.-+.-+.+-.-+-+.+-++-.-+-++,+-+.-/.+++-/+-.+.-+.-+.+-+-++*-+.-+-+.+-++-++-.+-0-++-++-+-+.-+++-.+-+.+-++-+-+-+-.+-++-.-++.-++-/-++-++-+*-+-+-++.-+++-++-.+-.++-.-++-+-.-+.-+-.-+-++-+11111111111114/+-.-+-+-.+-/.+-++-+-++-+.-+.-0*-.-/+-+-++-.+-.-+-.+-.+-+-+.-++.+-++-0+-+-++--++-.-+.-+-+-++-++-++-.-+-.+-.+-.-+-++,+-+.++-.-++.-/++-.+-+-+-+.-/.+-+-++-+-&1111111111111*-/-+-.-+-+-+.-+-.-+-+++-+-0++-+++-.-++-+.-+.-+.-+-+-+-+-++-.-++-.-+-.-+++-.+-+-+-+-+-+-++-.+-+-+.-+++-+.-/-++-+-+-+-.-+-+-/-+-+**-0++-0-++-+.+-/-++-.+-/*-+-+.-+-.-.+-+-.-+-+-.-+-.+-0++-.+-+-/+-++-+-+-+-.-+.-/.-+-/.+-.+-+-+-.-+.-++-++--+-+.-++++-+-++-++-+.-++%11111111111113+-+++-+.-+-+-+-.+-+.+-.-+-++-+-/*+-.-+++-.-+-++*-++-++-+-.-+-.-+-.+-+-+-/.-+.++-+-++-+++-.+-.-+-.-+*-+++-++-+++-.+-/-.+-+-+++-+-+-.-++-++,+-+-+-+-.+-+-+.+31111111111111%+*-.+++-++-.+-+++-+++-0-++*-.-+-+-++-.-++-++-+-+-++-.+-.+-+-+++-+++-+-+-.-++-.-++,+-.+-.+-++-+-.+-+-+-.+-+-+.-++-.+-/*-+.-+-++.-++*-+-+-+.-+-+-+-.+-/+-.-++-.+-+++-++-0++-+-+.+-++-+-+-+-++-+.+--.+-+.+-.++-++-+-+-.+-+-++-/.+-++-+-++-.+-.++.-+-.-+-.+-.-+.-++-+.-6111111111111+-.-+-.+-++-+.-++-.-+-++-++-.-+*-0-++-.--++-++-0-++-.+-.-++*+-++-/*-0*-+.-+-+-+-.++-.+-.-++-++*.-++-/.+-+-+-.+-.-+-.-++-+-.+-+-.+-+-++-.+-/-.+-.+-++-+.-+--+1111111111113/-++-+-.+-++-+-.-+-.-+-.+-/-+-+.-.+-++-.-+.-+.+-.+-+-+++-.+.-+-.-+-.++.-++-+-+++-/-++-++-/.-+.+-+-+.-++-+-.+-+.-++-.-+++-+.+-+-++.+-+.-++-+.+-.++-0*--++-.-++-+-.-++-+-+-.++-+-++-.+-+.-+.-+-+-.++-.-+-+-+-+.-+.+-++-+-.+-.-+-.+-.++-.-+-++-+-++-++-++-+++-+-.-+*-++111111111214*+++-++-/*-.+-+.-+++-+.-+.-+++-0*-/*-/++*.-+.-+-.+-+-+-+++-0-++-.-++-++*-++-+.-+-+-+--++-+-.+-/-++-.-+-0-+.-+-+-+++-++-+.-+-.-++-.++-+-+-+-++-++-.+-0*-/.+++%11111111121+-.+-.-++-.+-+-++-++-++-+-.-++.+-++-.+-++-+-+-+-++-/.+-+-+-+-+-+++-++-+-++-.++-.-+-.+-/.-+-+-+-+-+.-+-.-+++-+-+-++-+-+-.-+-+-.+-.-*-/*-+.-+-+-+-+-+-0*+.-++-+-.+*-.+-0*-++-+-.*-.-++-++-++-+.+-+-+-+++-++.+-+-+-+-.+-+.+-+-++-++-+-+-+++-.+-+-.+-+.-+.-+-.-++-++-.++%1111111111117*+-.+-+-.+-+-/-+-.-++-++-+-0-+-++-.*-.-/-++-+-++-.+-++-.-+-.+-++-.-+-0-+-+.+-+.+-0++.+-+.-+-.-+.-/*-++-++-++-.+-+-.+-.+-/++-.+-/*--.+-+.-.+-.-+-+-+-+*-+-+7111111111111%++-++-+-+-.-+.+-+.-+.-+++-+.-+-+-+-+-.+-.+-+.-++-.-+-.-+.+-++.-+-.+-+-.+-+-+-++-.-+-+--+.-++-.-++-++-++-.-++-.-+-.++.-+-.+-++-++*,*-.+-+-.++-+.-+-+-+--++-.++-/-++-+-+.+-0++-/++-.-+.-+.-+-+-++,+-+-.-+-+-.+-.+-+-.-+-+-++-.-+-+.+-.-+-++-0++-.*-+-+-+++-.+-+.-++6(111111111111111)-/+-.*-+-++.-++++-.-++-.+*-++-.-+-/*-+-.+-+.+-+-+-.+-++-+-+-.+-++-.+-+.+-+-+-+-+-+-+-++-++-+-+-+-.+,-+.-++-++-+.-+-+-/*-.-++-+-.+++-.+-++-+++-++-+.-/.++411111111111111160+-+.+-+++-+-0+-/*-+-.-++-+-.+-.+-++-+-+++-+.-+-++-+-+-+-.-+-.-+-.-++-+.+-.+-++++-.+*+-+.-+++.-++-.+-+-.+-++*.-+-+-++++-.+-.+-+++-+-.++-.-++-++,+-.++.-+-+-+-.+-+-.-+-+-+-.-+-+++-+-+-++.-+.-/-.+-+-+.-/*-/+-++*+-++-.+-++-.+-+-+++-0+-+-+-+-0++-.+-.-++-.+-/+ 2111111111111111113++-0++-.-+-.-+-++-.-+-/-+-.++-.+-.++-+-+-+-.+-.++-.+-++.+-+-+.-++-+-+-+-+.+-++-+.-+.-++-.+++-++-/-+-+-.-+.-++-++-+.-++-++-+.-+-.-++-++-+-.-.+-.+-+-*6111111111111111112!*+-+-.+-+-.-+-+-.*-++-.-+-++-++-.+-+.+-0-+-+-++.-++.+-+-++-++++-+++-.-+-++-.+-+-++-0-++-+-.-+-.-++-.-++-.+-/-+++-.+-.-+-+-+-/.+-0++-+-++-.-+.-/-++-+-++-.+-++-.+*+-++-.-+*-+.-+-.+-.+-+-++-+-++-++.+-+-+-.-+.-/-.+-++-0+-++-0++-.-+-.-+.-+-+-+-++-+-++-/*-+-)111111111111111111111!*+-+-++-+-++-.-+++-++-.++-+-++-+-+-.+-.+-++-++-+-+-.+-+-.+-+-++-+.+-/.+-+-.+-.+-/-+-.-++-.-+.-+-++.-+++-+-.-+.-++-+-0*-.-+-++-+-+-.-+,-/++-++-+-++&211111111111111111111-++-+-.-++*+-++-/.+-++-+.+-.+-++-.-/-+-+.+-.+-+-.-+-/.++-.+-.-+.-+-++-+.-+-0*-0*-+-+.-+++-+-+++-+-+++-/*-.-+.-+-+-+-++-+.-+-***-+-+-.+-++-+-+-+.-+-.+-++-.+-/+-/-.+-+++-0++-+-++-++-.-+.-++-.-.+-+-+-.+*+-+-+-++-.+-+--.+-+-+-++-+-++*-+.++-.-+-.+-+-.-++511111111111111111111111(-+-.+-++,+-/++-0-+.-+-.-+-.+-.++-++-++-.+-.+-.-+++-/*-/*-+.-+-.-+-.-+-.+-+-++-+-.++-.+-+-/+-+.*-+-++-.-++-++-+-.-++-+++-+++-.+++-++-/*-+-+-.-++-1111111111111111111111123*+++-.+-0-+.-+-+-+.-++-+-+-.-+-++-++.-+-++-.-+++-.-+-+-+-+-++-+-.+-+-++-+-++-.++-+-+-.-+.+-.-+.+-+-.-++-++-+-.++-+.-++-+.+-.+-.+-++-+.-++.-++-++-+-.+-+-.-+-.-++-.-+-+--.-+.*-.+-+-++-+.-++-+-+-.-++-/-+.-+.-+-+-.++*+-.-+-.+-++,+-/-+-+-++++-+-.++-/+%1111111111111111111111111127+*-0+-/-.-+-+-++-+++-/++-+-+--.+-.+-+-+-+-/++-.-+-.+-+.+-+++-++-++-++-.+-.-+++-+-++-/*-.-+-/-.+-.-+-.+-.+-.++-.+-+-.-+.-.-+-.-++-.-+.+-.-+++711111111111111111111111111%*+-++-+-++-+-.-++-+.-+-+++-+++-.-+--++-.-+++-+-+++-.-0++-.+-+-++-0+.-++.-+-+-.-+.-++-++-+-++-+-.-+*-.-++-0++-.-++-+.-+-+-+*-/*-+.-/+-+-+-+.-+.-/.+-+-++-++-++-+-++.-++++-+-/-+-+.+-.-+-++-++.-++++-.-++-++-+.-++-.-/-++++-+-.+-/-.-+.+-.+-.-.++-.-+-111111111111111111111111111114+-+-+-++-.+-.+-+-.-+-.-/*-+.++-++-0+*+-.+-.-+-.*-+-+-+-+-.-++-.+-++-+*-+++-.-++-.-+-.+*-.+-++-+++-++-++-+-+-++-.+-+-+-+-+++-.+-+-+-+-++++-%11111111111111111111111111111-++-0*-.-+.++-.-++-+.+-.-+.--++-.+*+-++-+-.-+.-+-++*-+-++-0++.-+-+-+-+-+.-++-++-+.-++-.-++-.-+++-0++-.-+-+-++-.-++-+.+-+++*-+.-+-.-+-.+-+-+-/*-+-+-.+-.+-.+-+.+-+-+.-+-.+*-++.-+-+++-.+-.-+-++-.-+-.*-+.-++-++-+-+-.+-+-.+-+-.-++-+-+-+-+-++--++-+-+-+-+-+.+*.51111112+.+-+-+-.+-.+-.+-+.-++-++-.-++-++-+-.++-+-.-+-+-0-++-+-+++-0++-.+-+.-+-.-++-.+-0+-+-.-+-.*-++-.+-/-+-+-.-+-.-++-0*-/+-+-.-++-++.+-++-.-+-.+-+.+-.+-+-.+-+-++-++-0*111111 *.-+++-+.-+-.-+-+++-+-+-++-.-+-+-++-+-+.+-++-0-.+-0++-++-+.-+-/-+-.-+-+-+-.+-+-.+-+-++-+.-++-+.-+-+.-/++-.-+-+-++-++-.+-++-.-+-+-.+-.+-+-++*-+.++-.++-.-++-.+++-/*-+*-0-+-.-++-+-+*-0-+-+-++-0-++-+++-.+-+-+++-0+-+-.-+.-.++.-+-.-++-.++-++-.++-++.+-+-++.-+.-+-.+-+-+-/-+11111)++-.+.-++-++-++-.+-++-.+-++++-.+-.++-+-+-++-.+-+-++-++.-+-+-+-++-/+-++++-+-+-+-+-0++-+++-0++-++-+-.+*.-++++-+.-+-+-.-+.++-+-.+-+-.+-++-++-+.+-+-+-.-++-+-.+-.+-+-+4111112+-++-0-++-+*-++-+-.-+++-0*-++-.+-.+-++.-+-.+-+-++-+-+-+.-++-++,-+.++-.+-.-++-+.*+-.++-.-+-+.-++-++++-+-.-++-++-.+-.+-++-.+-++-.+-++-.*-0++-0-++-+-+-+-++-.-++-+-.-+.-/*-/*+-.+-+.+-/*-/.+-+.-+-++-.-+-+-+-.+-+-+--++-++-+-+-+-+++-.+-+-+-+.-++-.-+-+-+.+-+-++-+.++-.+.-+-.+411111&+-+-+-++-.+-+.-++-+-.-+-+-.-+-+-+-+-.-/.+-+++-.++-.-+-+-.+-+-.-+-.-++-.-+.-+-.+-+-+-+-.-+-.-++-.-++-/-++-.-++-+-.++-.+-+-+.-+-+-++-.+-+.-+-+-+-.++-++-.++-+-+-.*-.511111+-+-+-+.-+-/.+-.++-+-.-+-+.+-++-++-.-+-++-+-+.-+-++.-+-+-.-+.-/-+-+-++-+++-+-+-/-+-+-++-.+-+-.-+-.-.-++-++-+.-++-++-.-+-+-.+-++-.+-++,*-+-+-+.-+-+.+-.+-++-+-.-++-+-+-.*-/-++-.-+-.-.+-+-/*-/*-.-++-.+-.+++-0*-++,+-+.-++-++-.-+-++-.++-.+-+-+-+-.+-.-+-.+-.-++-+-+-+-+++-+711111-+.+-++-.-+-+-+-+-.++-++-.+-+-+.+-++-++-+-.-+-+-+-++-.+-++-.+++-.+-+.-+-++-+.++-.++-.+-++-+-.+-++*+-.-++-+-+.-+++-+-++-+-.+-/*-.+-+-+-++-+-.+-++-+-.+-+-+-.+-.+-/++-21111 +.+-.+-+-.+-+-+-+-+.+-+++-/-+-.-+-+++-++-.+-+-+.+-+-+.+-++-+-+-+.+-.+-+-.-+.-.+-+.+-+.-++-.++-.++-+-++-.+-.-+-+-.+-++-.+-++-.+-++-.-+++-+.-++-/,+-+-++-.+-.++-++-.+-++-0*-0*-/++-+-+-+-+.-.+-.++-+-++-++-.-+-.+.-/-.+-+-.+.-+++-.+-+-+-+-+-.+-+.++-+++-++-++-.-+-+.+-+-.-+.-2111+-+-.+-+++-.+,+-++-+-.+-++-++.-+-+.-.+-.-+++-.++-.+-++-.+-++-+-++-++-+-+.-++-+-+-+-++-.+-.++-.-+-0-+-.+-.+-+-+-.-++-.-++*-/*-.++-.+-.+-.-+++-+.-+-++-.++-++-++-+-.-+)1111--+-++-.+*-0*-/+.-++-+-.--.-+.++-.+-.-+.-++-.++-+-.-+-+-.+-.++-.+-+-+-.++-++-++-+-+-.+-++-+-/-+-+-.++-.-+-+++-+.-+-.-+++-++-+-+-.-++-++-/*-+.-+-/-+-.+-++-+-+-+.-++-.+-+-++-+.-+-.+++-+.-+-+-+-+-/.+-.-+-+-+-+-+-+-++-+++-+-+-.-++-.++-.+-+++-.+-+-+-.-+.-++-++-.+-+-.++-++-+)111&++-++-.-+-++-/-+.-+-++-.+-.-+-++-+-++-+++-.-+-.-++-.+-++-.+-.-.+-+-.-+.+-+.-+-.+-.-+-++-+-+-++-++-+++-+-+-.++-++-.-+++-0-+-++-/-++-++-/++-.-++-/.+-+-+--.+-+-.-++-++&111++-.+-+-/-+-+.-+-+.-+-+++*+-+-+-++-++-+-+.-+-.-++-++.+-++-/*--++-+-+++-+-.+-++-+.+-++-+-.-++-.++-+-+-++-++-.-++-++-++-.-+.-+.-++-++-.+**-.+-+-.*-/.+-+-.-++.-++-/.-++-.-+-.-+-+-++-.-++-+++-++.-+-+-++-.+-++.+-++-+.-+-.-+-+++-+.-+-/-++-.+-+-+-+-.+-++-+-.-+.-++-.++-+-.+-++&111--+.-++-+.-+-+-.+-+.+-+-+-+++-.+-+.-+-+-.-+-+++-.+-+-+-.-+--++-+-.++-++-+-+-+-++-++*.-+-++.-+.-+.-+-.-+.-++-+-.+-+++-.-+-.+-.-+-.+-.+-.-+-++-.-+-+-.+-+.++-.++-+.-++-.111&+-++-.+*-.+-+-+-++-+.+-+-0-+.+-.+-.+-.+-+-+++-.+-.+-+-.+-.-+.+.-+.+-.-+-++-.+-.-+-.+-0++-.+-+-+-0++-.+-.+-++-.-++-.+-+-++-+-++.-++-++-.+-+-.++-0*-+-++-++-/-+.-+-+-+-++++-++-.+-.-+-+.-+-.-.-+-+.+-.+-++-.*-+-+.-.+-+++-+.+-.-+-/*-+-.+-++-.-+.+-++-.+-.++-++-+-+-+-+-+-+-.-+.11++-+-.-++-+.-+-+-+-+-.+-.+-+-++-.+-+.+-++-++-.-++-++.-++-+++.-+++-.-++-+-.+-+.+-.+-/-+.-+--++-+-+-++-++-++-.+-+-.+-+-++-++-++-.-+-+-++-+-.+-++-.+-++-.+-+-+-+-.+-+.-++)11-.+-+-+-/-+-+.-++.-+-+-.-+-++-+-+-+-+-+-.+-+-+-+-+*-0-++-++-+-+-+-+-++-.+-+-+-++-+-+-+-+-++-++.-+-.-++-++-.+-++-.-++-.-+.-+.+-+-+-.-+-+*-0++-+-+-++-.+-.+-.-++-/,-+.-+.-+-.+-++-+++-.+-+++-+++-.-+-++-.+-++-+-.+-+-/*-0-+-+-++-.+-++.-+-.+-+++-+-.+-++-+-+-+.-+++.-+.-+.*+-++-+)1 .-+++-+.-++-+.++-.+-++-++-.+-.-++-+-+-.+-.+-++-+-.-+-++-.+-+-+.-+-++-.-.++-.+-+-+-.-++-++.++-++.-+.-+.-+.-++-.+-+-.-++-.+-.+-++++-.+-++.-+-.+-++-.+-++-+-.+-++-+-+-++-71*--.+-.+-.+++-+.-+-.+-++*+-.-+-++.-+.++-+-.+.-+.+-/*-++-.+-.+-+-+.-+.-++-/.+-.+-++.+-++-.+-.-+-+++-++-+-.-+-.+-+++-+-+++-+-+-.-+.++-.+++*-+-+-.+-.-++-++-+-+.-+-/*+-++-+-++-.+-.-+-++-+-.-+-+-++-++-+-+-.+-0++-+-++-.+-+.+-.+-++-.-+-+*-+-.-+-.+-+-.+-/+.-++-+.-+-++-/*-/-+.-+-716++-.-++-+.-++-/-++-.+-+.-++-++-+-+.+-++-++-+.-++-++-.+-++-.-++-+-.+-+++-/-++-+-.++-.+-.-+-+-.-+-++-++-++-/.-++-.++-.+-+-+-+-+.-+-++-.-+-++-+-+.-+-.-+-.++-+.+-+.+-+.-+-1&++++-++-+-+-.-+-+-++-.+-0-++-.+-+-++-+-.++-+-+-+-.-++-.-+-++-.+++-/-+-+-.-+-++-.+-+-.+-++-+*-++-.-+.-+.-++-++-+-.-+.+-.-+-.++-++-+-++-..+-+.-++-++-+-.+-0++-+-.*-0-+-.-+.-+-+-+++-0*-0++-+.+-.+-.+-.++-/+-+-+-/+.-+-+-+-+-++-.+-++-++-0++-++-++-++-+-.-+-+-.-+-+-.+-.-+.-++-/.+6+--++-.-++-+.-+-.+-++-+-+-+-.+-++.-+-+.-++-.+-+.-++-++-.+-/++-.-+++-.-+-+-.+-.++-+-+*-/++-.-+++-+.-+-.-+-+--++-+-+-++-.++-.+-+-+-.+-/++-.+-.+-+-++*+-++-+-+-+-+-+-.-+-.+5+-+-.+-++.-+-.++-.+-/*-+-++-++-.+-+-.-++--+-++.-+-.-+-++-+-.-+-.-+-++.+-++-+-.-+-.-++-.*-0-/.+-+*-+-+-+++-.+-.++-+-+-+-+++-/-.+-+-.+-+-''''''''''''''''''''' '''''''''''''' ''''''''''''*-/*-++-0+-.+-+-+-+-.++-/*-+++-++-.+-++-.-+-++-+-.-+-++-++-+-.-+-+-.+-.-+-+.+-+.+-+-.-+-.-+.+-+-+-.+-.+-+.-/++-+-.++-.+-++-+-++-+-.-+-+-+6.+.+-++-.-+--+.-+-.+-0++-+.-+-.-+-+-.-+-.-+-+-+-+.-.-+-+-+-.-+++-.-++-.+-+-+-+-+-+.-/,-+-+++-.-++-+++-+.-.+++-.++-.+-+-+-++-+.+-++-.-+-++-++-.+-+-0-+.-+-.+.-+.+-/++-++-6.+-.-+-.-+-+++-+-++-.-++-.+-.+-/*-0++-++-.+.+-+-++++-+.+-.+++-++-+-.+-/-.+-.++-++-+-+-+-/*-+-+-.-/+.-+.-+-++-+-+-+.+-0++-.-+-++-0++-.-+*',*-.+-+-+-++-.++-.-+-.-+-.+-.-+.-++-.+-++-+-.-+-+++-.+-+-.-++-.+-.++-+++-.-+-+-+-.+*+-+-++-+-.+-++-+-+-.+-+-.-+++-+-++-.+-0++-.-+++-.+-++-+-+-.+-++-.+*+-++-+-+-.-++-+++-.+-++*+-++-+-+.-++-+++-.+-.+-+-.-+-++-++-+.*+-.+-.+-+-++-.+-+-+-.-+-.-++-++-.-+-+-++-.++-+.-+-+-.+-+-+-.+-0+-++-.+*-++-/++-+-+-+-.-+-.+-.-+-++++-+-++-.-+-+.-/*-.-++-++-.-++-+-.+-++-+-.+-+-.-++-+-+-+-.+-+.*+-.-++-+-+-+.-++.+-.+-+.+-++-.-+-++-+-.+-+.-+.-+-+-+-++-.-+-+-+-/++-+++-+-.+*-+.-+-+-++*+-++-+-+-+-+-++-++-.+-+.*+-.+-+-++-.++-++-++-++--+-.-+++-.+.-++-/-++.+-.-++-.+-/.+-++-++-++-.-+-+.-/*-+-+-+++-.-++-+.-.++-++-.+-++-0-++-.+-++-.+-+-.-++-.+-/-.+-.+++-+.-+-+-++-+*-+++-++-.-+.-++-/-++-++-+-.-+-+-.-+.++-++-.+-/*-/-.+-+-.-+-.-++-+.+-++-.+++-+-+-+-.-++-/-.-+-.-+-++.-++-++-+-++-.+-+-.+.+-/*-+.*-+-.++-+-.+-++-.-+-++-+.-+-++-.++-+.-+-++.-++-.+-/-+-+*-++.-++-++-+-++-+-+-.+-+++-.+-.-++-++-++-++-.+-.+-++*.-+.-+-.-+. +-0++-0-++-+++-.+-/-.+-+.+-++.+-+-.+-++-.+-/-++-+.-+-+-+-+.-.+-.+-+.++-+-+-++-+-+-.-+.-+-+-++-+*-.-+-.+-.+-.+-++-.++-+-.+-+-.-+-+-++-.+-++-.-+-+-+-.-+-.+-++-.+-++-0++-++-++-.-++-++-.-+-+-.+-.+-+-0+-.-+.-+++-+-.-+-.+-.+-.+++-.+*+-++-+-+.-/+-.-.+-++-+.*+-++-.+-.-+-.-+-+-.-.++-.-++-+-.-+++-++-.+-+-++-.+-+.+-+++-0-++-+-.-+.+-/-++-/-.+-+-.-+++-.+-.-+-/.+-+-+-+-+-+.+-+-+-+-+-+-.++-0+-+-+.-/.-+-.+-+.+-++-+-.-++-+++-.-.-+.-++-++-++-.+-/-++-.++-+-+**-+-+-.+-+-.-++-.-++-+-+-.+-+-+.-+-.-+-+-+-.+-0*-+.-+.-++-+-+-+-++-+-.++-.+-+-0++-++-+-++.-+.-/+-+-++-+--++-.-/*+-+-+-+-+.++-.+-++-+-+-+-+-+.+-+.++-++-.-+-++-.-/*-+-.+-.-+-+-+-.+-+-0+.-++-++-.++--++-+-++-.-++-+.-+-+-+-+-+-++-0-++-+-.+-+--++-+-.+-.+-/-.+-++-+-+++-.+-++-+-+-+++*-0++-.-+-.+-++-.-+.-++-.-+-.-.-+-++-+-+-+-+-+-+.-+-++-.+-++-.-++-+++-.-+-.-+.+-.++-+-0*-.+-.+-++-+-+--.+-+-+--+.-+-.-+-.+-.++-++-+-.-++-++-+-.-+.-+-+-+-.-+.-+-+-++.+.+-.+-++-0++-++-++-+-.++-++-+-.+-++-++-.+-+-+-+-+++-++-+.-+-++.-+.-+-/*-.-+-.+*-+-+.-+.+-+-+-+-.-+.+-.-+++.-+-.-+-.-.+++-+-+-++-+.-.+-.+-.++-+-++-+-.+-++-.+-.-++-+/-++-/++-.++.-+-.++-+-++-0+-+-+-+.+-.+-.-+-+.-++-++-++-.++-.+-+-+.-.++-+-+.*.-++-+-++-+-++-/,-++.-+-++-.+-.++-.+-0-+-+-++*+-+-.+-/++-+-.-+++-++-++-+.-+-.+++-.+-.+-+-.+-++-.+-+-++-.-+-+++-++++-+-+-.-++-+++-++-+.-+.-+.*+-.+-+.++-++-++-++-+-+-+-.-++-++-.+-.++-++-+.+-.++-++-+++-.-+-*'*-/*-+.-+-.-+-.-+-.++-0-++-.++-++-+.+-++-.+*.-++-0-++-.+-/.+-+-++-+.+-++-/++-/-.+-+-+-/-+.-+-++-+-+-++-.-+-++*+-++-++-.-+.+-.+-.+-+-+++-++-.-+-.-+-++-+.-++-++-+-.-3-/-+-.-++-+-++-+-* ++-.-+-.+-.+-+-+*-/++-.+-+.-+.-+.-++-.-+-.+-+-+-+-.+++-/-+.-++-.-+.-+-.-++-+-+7++-++-+-+-++-+-++-7++-0-+.-+-.-+-.++-+-.-+-+.+-.+-+.++-.-++-++-+++-.-+-++-.-+.-++-+.-+-.+-.-+-.++-+.-+-0-+.-++-++-++-/-++-++-+-.+-+-.-+-+.+-.++-+.-+.-++-+-+-+.-+-+-+-+-.+-+-.-+++-+- +*-+.-+-++-/++-+.+-+-+-.+-+-+-.-+.-/-+.-++-/-+.-+-.+-++-+-+-.+-.-+-+-.-/,-+-+-++-.++-.-++-+.+.-+.+-++-+++-+.-/-.+-++-+-++-+-+-+-+-++-0-+.-+-.+++-.+-+-+-++-.+-.++-+723+++-++-.-+,-++-4*-++*-++-++-/++-0*-+-++-+-+-+-++-++-+-+++-+.+-++-+--.-+-++-+.-++-+-+++-+--.+-+)-/+-.++-.+-.-++5 +-+-++-+++-+-+-+-+++-+.+-+-+-+-+-+-+-++-.+-+-.-++-.+-+-+++-++-.+-+*-+-+-+++-/-.+-+-+-++-+-.-+-+.-+-.+-/,-/-++-0+++-.+-+-+-+-.+-/*-/-+-+.-+-+-.+-.+++-+-.++-+-.-+.*(.+-+-++*-0*-.-++-+-.+-++-+.+-++-+-+-.+-/.-+-.+-++-+-.--+.-++-+++-.+-+-+-+-.+-.+-+-+-++-.-++-+-+-+-+.-.+-.-+-+-++-0+-.-+.-+-++.-++.+-+-++-++-+-+-++-.+-.+-+-+-+-+-.++1%*-/.-/++-/+*31&.+-/-.+-0+-.-.-+-.+-.+-+.+-.++-.-+-.++-.-+-+-.+-0++++-.+-.-+-++-+.+-.-/+.++-.+ 15,+-/-++-++++%1*,+-+.-+-.-++.+-.+-.-+-+-+-++,+-.+-++.-+-+-.++-++-++-/.+-.-+-.-+-+-0++-.+-.-+-++-++.+-+-.++-.++-++-++-.-++-.+-+-+--++-+-.++-++-+-.+-+.++-+.+-++-++-.-+-+-+-.++-++-/*-0++-0-+-++-+.-+-++-.+-.-+-+-+.+-+-+-+--++-+-+-.++-+.*+-+.-+-.-++-.+++-.++-++-.++-.+-++-.-+-++.-++-+-+-+-+.-+.-+-+-+++-+.+-+-++-+-.-+.-+.-++.-+.-++-++-+.-+++.-++-.411-+-+-.-+-/&116*-.-++-+-+-++-+-+-+-+-.-+-++--++-.+-+-+-+.+-++-+-+-.-++-+++-.+-.-+-+-+-+-+-++-+111!++-.+-+-+-(11)++-.+-+++-+.-+-++-++-.+-+.-+-/-++-.-+-+.+-+-+-.+-+.-+-+-+-+-++++-.+-+-++-++-.+-.-+-+-.++-+-++-.-+-.+-++-+-++-+.-++.+-.++-+-.+-++-+-++-+-.-+-.+-/,-/-++.+-++-+-+.-+-(,*-+-+-++-.-++-+.+-+-+-+++-+.+-+-0+*+-.+*+-.+-++-+-++-/-.+-+++-++-++-.-++-+-.-+-.-++-.+-++-.+-+-+.-/++-.+++-/*-+*-.+-+-.-+-.+-.-.-+++-+-+-++-+-+-++-.+-++-+.-+-++-+-511127+++-++-111.++-.+-.+-++.-++.+-.+++-+++-.++.-++-+-.++-/-.+-.+-++-++-.-+-++-+++-++,+-.+-.+-++)111(-+-+-.+72111 ++-+-+-.-++-+-++-.+-++-++-+.+-+.-+++-.-+-.++-++-.-+-.+-++.+-.-+-++-+-.+-.+-++-++-.+-+-+-+-.+-+-+.-+-.+-.+-.-++-+.-+-+-+-.+-+-.+-.+-.-+-+++-++-+-++-.+-+-.+-+-.+-+.*++-.+-.+-++-.-+-+-.+-++-.-+-+-+-+*-0-++-0-++-.+-0*-.-+-++-+-0-++-.-+-+-+-.-+++-++-.-++-+.-++-.+-+-+-.-++-.-+-.+-0++-.+-++-++-++-++-.-+++-.+-.-+.+-.-+-.-+-+-+-.+-.+-.1111)-+++31111&+-+-+-++-+.-+-+-+-++-.-+.-+-+-+-++-0++-.-+-++-++-.+-+.-++-.+-+.-+-/,-/-++-/+-0+-&111123+*++%11112+-+.-+++-+.-/.+-.-+-.+-.+-.+-+-+-+-.-+++-++-.-+-+++-++-.+-+-+++-0+-.++-+-+-.+-.-+++-+.+-.++-.-+++-++-+-++-++-.-++-+-++.-++-.+-+-++-++-.+-.-+.-+.-+-++-.-++-0++-+-+-+ +-/*-++-.+-++-+.-++-.+-+-+.+-+.+-/*-/*-+-.+-++-+-+++-.+-+-.+-+.-+++-.++.-++-.-++-++-+-+-+-+-++-+.-++-++-+-++-+-+-+-++-++-+.-++-++-+-+-.-++-+++-+-+-+++-.+.+-+-+-+-+++4111113*!1111116+.-+++-.-+-+-++.-/+-+-++-+-.+-+-.-+-+-++-.+-+-.-+-.-+-+.-++-+-+-.+-++-.+-+-+-+-.-111111%*611111)++-++-.-++-+-+-++-++-+-+-++-+-.+-++-++-.-+-+-+.+-.-+.-++-+-.+-.-+-+-+-+.+-++-+++-.-+-+-+-+-+++-.-++-.+-+-.+-++-.-++-.-+-+-++-.+-.-+.-++-++-+-++-+.-+-++-.-+-+-+.+-++(**-.+-+-+-.+-.+-++-++-0++-+-.-+-.-+.-.-++-+-.-+-+-.-++-.++-+-+-+-.-++-+-++-++-.-.+-/+.-.+++-.-++-+.-+.-+-.+-.+-.+-.+-.+-0-+-.-+.-.++.-+-.-+-.-+-++.-+-++-+-.++.-++-.-5111111111111*+-+.-+-++*.-+.--+-.-.+-+-.++-.+++-++-.+-++-.++-++++-+-+-++-.-.++-+-+-++-/,-.+-+-0111111111111 +-.-++-+-.-++-.+-.+-.+-.+-+-.+*-.+-.+-+-+.+-.+-+-++-+-+-.++-++-+*-.+-.-+-.+-.-+-+-+.+-/.+-+-.-+-.+-++-.+-+-.+-++-.-+++-+.+-+-+-++-+-++-.+-.+-+-.+-+.-+-+++-.-+-+-.+-.+-+-+.+-++-+-+-+-.+-+-+-.-+++-+-+-+-+++-.++-++.+-++-.-+--.+-.++-+-.-+-.+-.+-++-+-.-+-++-.-++-.-++-+-+-.++-++-++-++-+-0*-+++-+-+-+-+-++++-++-+.+-+-+.-+-+-++-+-+.-/*-.1111112111111&++-+-+-.+-/-++-++*+-++-.++-+-++-+-.+-++-.+-+-+-.+-+-.+*.-+-+++-+-.+-.-+-+-++*-.++-&11111111111212++++-.-+.++-.-/+-++-+-+++-.++-/-++-/+-.++-+-/*-/-.*-++.-+-+-.-/*-0++-+++-++-+++-.++-+-+-+-.++-+++-.-+-++-++-+-.+-+++-.-+-+-.+-++.-++.-+-+-++-.+-+-++-+.+-+-+++.-++-0*(*-/.+-/-.+-++.-+.-+-.-+.-++-.-++.+-++-.-+-+-+.-+-.+-++-++*+-++--.+++-++-+-+-.+-+++-.+-+-+-.+-++-.-+.+-++-+-.-+*-/-.-++-++-.-+.++-++-.+-+-.+-.-+-.+-+-++.-.+-+-.+-+-.++411111111111116.-+.+-++-.-++-.+-0-++-+-+-.-++-.-++-.-+-+-.++-/*-0-++-/-++.-+-+-++-++*.-+.-/-+-+-+-1111111111111)+-.-++-+-+-++-.-+.-++,-/-+-+-.-+.-+-.-+-0-+.-+,-++-.-+-++.-+-+-++-+-.+-+-.-+-.-+-.-++-.+-++-+-.-+-++-.+-0*-0*-+-.+--++-.+-++-+.-+-+-+-.+-.+-/*-/*-.-++--.+-.-+-++-+-. +*-+-.-++-.-+-++-+++-++-++-++-+-+-.+-++-.+-.+-+-++-.+-.+-0-+.-+++-+-.+-0++-++-/,--++-.+.-++-+.-+++-+-+.-+-+++-0*-+++-+-+-++-+-+-.+-/*-0-++-+++-++-+.+-+-++-0++-+-++-/-3111111111111+-+-+-.+-+-+.-++-+-+.-/.+-+++-.+-+.-+-.++-+-+-.-++-++-.-+.-+-.+-.+-.+-/-++-+-.++-+-.)111111111111 /+-++-.++-0*-+*-+-+-/-+-.+-++-++-/*-++-+-++-+-/++-/++-+-+-+++.-.-+-++-.-++-++-+++-.+-++-.+-.-+++-.+-++-+-++-+.+-+-+.+-++-+.-++-+-+.+-++-++-+-.+-.++-.-+++-+++-.+-.-++.+-++-++-+++-.+-.-+-.+-.+-.+-+.+-++-.+-++-++-++.-+-+-++-+-++-++-.-+-+-+-+-.+-.-++.+-+-+-++-.+-+-.-+-.+-++.-+-+-.+-.-+.+-.+-.+-.-+-.-++-.+-+-0-++-.+--.+-+-+-+-+-.+-+-++11111111111%8++.-++-.++-+-+-.*-+-+-+-+-.-+-+-+-+++-.-+.+-++-.-+.-/*-+-+-++-++-/*-.-+.-+++-.-.+++!111111211111++-.+-+-+-+-.+-/+.-+.-+++-.++-+.-+-+.+-+.+-+-.+-+-.-+-0+.-+.-+-++-.+-+-+++-.+-.-+-++-+.-++-/++-0-++-.+-.+-.-+-+-++.-+-.+-.+-+.-/+.-/-.+-+.-+.-+-+-+-++.-+-.+-+-+-+++-+*-0*-.+-.-/-++-+++-++-+-+-+-.-+-.-+-+-.+-+-+-.-+-++-.+-.-++-.+-+-+.++-.+-++-+-+-+--++-++-.-+-+++-+++-+-.-+-.+-+-+-++-+-++-++-++++-+-+-++-.+*-.+-+-++++-.+-.+-+.++-.++-1111111211117*+-/+-+-.-++-.+-/+.-+.-+.-++-+++.+-+-++-+--.+-++-+-+-+.+-+++-.+-+-++-+-+-.--++-+-+7111111111111(-/*-0++-.+-+-.-+-++-+-.-+-0-+-+-.+-+-+-+-.+-+-.-++-.+-+-/+-+-/*-/+-.++-.-++-+++-.+-.-+-+-+-.-+-++-+-+-+-++-.+-+-+-++-+-+-+-+-+-+-+-++-+-+-+-++-.+-+-+-+.-+-.-+.+-.-+.',*-++-+-++-.+-+-.-+.-+++-.+*+-++-++.+-+-.++.-++-.+-++-+++-.-+-.+-+-+-++-.+-.+++-.+*.-+.-/++-+-.-+-.-++-++-++-/+.-++-.-+.-+-.-+-+-.+*.-+-+-/-+-.-+-.-+-++-++-0-+--+-*7111111111111111)-*+-0*+-.+-++-+-+-++-++-++-.-. +-.-.*-/.+++-.+-++ +.-/-.+-.-+-.*-.-++++-++,+-+++411111111111111127++-.-++-++-++-+-+-.++-++-+.+-++-+-+.+-++-.++-.+-++-+-+-.-+.-+,-+-+-.-+-.-+-0-+-+-++-+.-++-++-.-+.+-+-.+-++-0+.-++-.+-++-.+-+.-++-.-+.+-+-.+-++-0+.-++-++-++-+-+-++- ++-.-++*-.-+-.++-++-+-.-++-/-.+-.+-+-++-+-+-++-++-.+-+-.-+++-++-+.+-.+-+-+-+-.-++-/-++-+-.-+.++-.+-+.-++-.+-.-+-+.-+-++-+++-.+.-++-/-+.-++-.++-.+++-.-+-.+-+-++++.+%1111111111111111115,+-/-++-.+-0*-.+-+-.-+.-/++-&-++-/*-+-.-+-.+-(%+-+-++-+-/++-0++-.-.-+.-/-++31111111111111111114*+-++-0*-+.-+.+.-+--.+-.-+-.+-+.+-+-.+-+-/-++-+.-++.+-++*-+-/+.-++-++++-++-++.-++-.+-+.-+.-+++-+-.+++-0+-+-+-+.-++-.+-++-.+-+.-+++-+-.+++-0+-+-+-+.-++-.+-.+-+.+-+(+-/++-0-++-++-/-.+-.+-+-+-.-++-/+-.-+.-++.-++-.+-++-0++-.-+-.+-.+-+-+-.++-.++-++-.-+.-+-+-++-+-++-++-+.-++-+++-.+-+-.+-+-.-++-+-+-.-++-+.-+-+-++-+-++*.-+-.++-.-+6(111111111111111111111!*+-0+-++-+-+++-.++-++-+-.-+6127++-.+-+-+-++ 213++-.+-.+*-+-+-+-+++-++-+-++&2111111111111111111116.+-+-.+-+-+-+-+++++-+++-++-.-+-.+-+-.+*-.+-.-+-.-+-.+-0-+.-+-++-.+-+-.+-+-+-+.-/*-/*-/*-+-+-.-++-.-+--.+-++-+-.-++-/,-/*-/*-+-+-.-++-.-+--.+-++-+-.-++-/*-/*--+.**-.-+-++-.+-+-++-++-.++.-+-+-.--++-+-+.-+-.-+-+-.-+-+-+++-++-++-+-.++-.-++-+-.-+*-+-+.++-.-+-.+-+.-+-+-.-+-.-++-++++-.++-++-+-.++-+.-+-+-++-.+-+-.+-/-++-+--++* 211111111111111111111111(-+-+-.-+-+-.-+-+-+.-+*-++-+114-++-.++.++411++-+-+-+-0-.+-+-.-+-+-.-++-111111111111111111111112!*+-+-.+*-.+-+-.-+-+-.-+.-+++-++-++-+-/-+-+++-++-+-+-+-++-+-.+-/*-0-++-.+.-++-+-.+-.+-.-+.+-+++-+-+++*+-.+-.++-++-.-++-.+-.-+.+-+++-+-+++*+-.+-.++-++-.-++-.+++-'.+-++-.+-++-0*-.-+--++-+-++*.-++++-.+-+-+-+++-.-++-++-.+-.-+-+-.-/++-+-+-+-.-+++-/.+-+-+-++-++-+-+-/.+-++-++-++-.+-+-+-+-.+-0++-+-++-+.+-.+-++-0*-+-.-++-.+*.+-)1111111111111111111111111117+*+-+.+.-++-.+-+-+-0++-+.&1113*+-+-*61114+-.++.-++-++-.+++-.+-++*+711111111111111111111111111-/++-/-++-.++-+-.++-++-+-0-+.-+.-.++-.++-.-.+-++,+-++-.-++*-.-++-++-+-+-+.-+-+-+-+-+++-+-.+-.-++-.-/-++-+-+-+.-+-+-+-+-+++-+-.+-.-++-.-/-++-+-+-+.-+-+-.-+-.-+ *-/,-++-.+-+-+++-.+*.-+-.+-/-++-.-++-.+-.+-.-++++-.+-++-+-+.+-++*-.-+-.+++-++-.-+-+-+.+-.+-.+-.+-.+-+-.+-.+-0*-+-+.-.+-+-+-+-+-.+-.-+-+-++-0+-+-.++-+-.-++-/-3111111111111111111111111111114.-++-+-++-++-.++-+-.-+-+51111!*/++&11113++-+--+.-+-+-+-+-++-/,-/%1111111111111111111111111111123+-+-.+-+-+-.++-+-+-.-++-++-+-+-+--+-+-++-+-+.-/-.+-++-.-/-+-+-.+-.+-+-+-++.+-.+-+-.-/*-+-+-.+-+-+-.+-.+-+-+-++.+-.+-+-.-/*-+-+-.+-+-+-.+-.+-+-+-++++-++-+-+*(+*-++-+-+-.-+-.-++-/-++-+-.-+.-+-.+-++-++-++-+-.-+-.-+-++.-+-.+-0-++-++-.-++-++-.+-.+-+-+-++-++-++-+-+*-/+-+-+.-+--++-.+*.-+.-++-++-.+-+.-+-.-++-/-.+++-+-.-++-++-.+-++-+&111111++-++-+.++-++-.-+-++-.-++-+-.++-/.+-+11111--)11111+-+-.+++-+.+-.++-.+-.-++-+-+-+++-.-+-(111111&+.-+-.+-.-+-.+-++-.++-++-+-.+-+++-.-+-/.+-++.+++-.+-++-+-+-++-.+-++*-.+*.-+-++-.+*.-+-+-++-.++-.-+.+-+++-.+*.-+-++-.+*.-+-+-++-.++-.-+.+-+++-.+*.-+-++-.+*.-+-.-+.-+.+-+ .+-+-+.+-+++.-++-/,-/+-.++-++-/++-+-.-++-0*-/++-+++-+.-+-+-+-+-+-++-.+-+-.+-.+-++-++-+-.++-.-+-+.-+.+-0*--.+-+-++.++-++-/-++-++-.+-++-++-++-++*-.-+*-/-.++-++-.+-+-+-.-+++1111114+-+.-++-+-.+-++-.+-.-++-.+-+-+-.-+-.+%1111111111114+*.-+-.-+-+-++-.-+-+*-+-.-/.+-.-+-.++%111111--+-+++-/++-++-+.-++-.-+-.-++-0*--++-.+-+-+.-+-.-++-.+-+.+-+.-++-.+-/-+-/-++-.-++-/-+.+-.+-+-+-+++-/-.+-+-+-/-++-.-++-/-+.+-.+-+-+-+++-/-.+-+-+-/-++-.-++-/-+.+-++-+-+-+.'*-0+.-+-.+-+-++-.-+-.-++-+-.-+-.-/++-.+-+-+.-.-+-.-++-+.+-++.+-++-.-+-0++-+-+-+-.-+-.++-+-++-.-+-+-+-+-++++-.+-+-+-.-+-.-++-+-.-+-.+-+.-++-+.-/-++-/,-/*--.+-+-+-.++-+-.-+)111113++-+-.-+-++-.+-++-/++-.-+-.++-+++-++-6111111111121113/+-/++-+.+-.+-+-+++-0++-++-+-+-+++-.-611111+++.-+-+-.-+.-+-+-+-+-0++-+.-+-++.+-++-+-.*-+-+-+.-+-.+-+-+-+-+-++-.-++*-.+-++-+-.-++-+-+-+.+-+-.-+-++-.-++*-.+-++-+-.-++-+-+-+.+-+-.-+-++-.-++*-.+-++-+-.-++-+-.-++.-++- ,*-+-+-++-.-++-+-+++-++-.-+++-+-+-.-++-.+-+-+-+++-+.-+-+-.+-+-.+-++-++-+-/+.-+.*+-++-+-.-+.-++*+-.+-.+-.-+-++-0+.-+-+++-+.-.-+++-++-+-+-.-.+-+-.+-.-++-.+++-+-.++-+-+.++-. 1111++-.++-+.+-+-+-.+-.-+-++*-++-.-+--.+-.+111112111111+--+-.-+-+-++-.++-.-+-+-.+-.-+++-.-++-+1111&,-+-+.-++-++-+-.++-.+*-+-++-++-.-+-.+-.++-/*-+.+-+-++-.+-+.*+-.-+-+-.+-0-+-.*-/.+-+.-+-++.-/-.+*+-.-+-+-.+-0-+-.*-/.+-+.-+-++.-/-.+*+-.-+-+-.+-0-+-.*-/.+-+.-+-+++-/-+.-+(++-++-.+-++-.-.++-.-+.-+++-.-+.++-++-+-+-.+-++-.-++-/.+-+-.+-++-.+-+.-+-.-+-++-/-.+-++-+++-++-0-++-+-+++-.-+-+-+-/++-.-++-+++-.-+.-/.+-++-+-+-++-+-+-+-+-+-0++-+-.+-+-+-++611114+-+-+-+-+-/.+-++-++-.+-/-.+-+-+.+*+-+-+%111111111111%+,+*+-+.+-.-+-+-+-++-.-++-+++-.-+-++-+.!11116++-.+-+.-++-.++-.-++-/-.+-.-+-++-+-+-+-+-+-0++-+-.+-+-+-++-/-++*.-+++-+-+++-0+-+-++-+.+-+-+-++-/-++*.-+++-+-+++-0+-+-++-+.+-+-+-++-/-++*.-+++-+-+++-0+-+-++-+.+-+-.-++-+++-0*-++-0+-+++-+-++-+-+-.-++-+-+-.+-+.+-++-.+-++-.-+-+-0++--.-+-+-.+-++*+-+-.-+-++-.+-.+-+-.-+-.+-/+.-+-++*.-+.-+-.-++-.-+-+-++-+-+-+-.+-++-+.+-.+++-.+-.-+-.-+-++-.+-+-.-+1113/,+-.-+.-+-+-.+-.+-++-.-++-.++-+-/-.-+.61111111111115++-0-+-+-++++-.+-.+-+++-+-.-+-++-.+-.-+6111*+-++-+-+-.-+-+-++-+-.-++-++-+.+-.+++-.+-.-+-.-+-++-.+-+-.-+-.+-/-++-.-++-.-+--.+-.-+-+-.+-+-.-+-.+-/-++-.-++-.-+--.+-.-+-+-.+-+-.-+-.+-/-++-.-++-.-+--.+-.-+-+-.+-+-.-+-.(**-+.-+-+-.-+-+-.+-.+-++-++-.+-.-+-.-+-.+-++-.+-++-.+-+-+-++++-.++-+-+-0-+.++-.+-+-+-++-.-+++-++-+-+-+-.+-/-++-+++-.+-++-.+-.+-++-.+-++-.+-.+-+-+-.-++-++*+-++-.+-++-.+++-.&111+-/-++++-+.+-+-+-+-.+-+-+.-+-.-+-.-++++61111111121113*+-+.+-.+-.-++-++-+-.-+.-++-.+-++-+++-+11&+-.+-/.+-++-++-.+-.++-++-.+-.+-+-+-.-++-++*+-++-.+-++-.+++-.-+-.-+.-+-+.-++-++*+-++-.+-++-.+++-.-+-.-+.-+-+.-++-++*+-++-.+-++-.+++-.-+-.-+.-+-+.-++-++*+-++-.+-++-++++-.++ '.+-+-+.*-+++-.++-/*+-+.-+.-++-++*+-++-++-.-+-+-.+-++-.++-.+-.-++--.+-.+-++-+-++-+.+-.+-/++-.-++-.+-.+-++-.-+.-+-.-++-.+-++-++-.-.++-.+-++-++-+-.++-++-.+-/-.+-++-.+-++-.-++-11)+*-.+-.-+-+-.+++-++-+-.++-+++-.+++-+-+&211111111111111!*+-+-+-+-+-+-.+-0++-++-++-++-.+-+-.-++%116,-+-.-+-.+-.+-++-+-+-.+-++-++-+-.++-++-.+-/-.+-++-.+-++-.-++++-++-+-.++-++-.+-/-.+-++-.+-++-.-++++-++-+-.++-++-.+-/-.+-++-.+-++-.-++++-++-+-.++-++-.+-/-.+-++-.+-+.-+-++-**-/.+-/-.+--+-.-+-0-+-+-+-++-.+-0-++-.+-+-.++-++-.+-+-+-++-+-+*-+++-++-+-.-+-.-+-+-++-.-+-++-.-++-++-.+-++-+-+++-+-+-+-.+-.+-/++-+-+-+-.-+.-+++-+-.-+-+-.-++-.+-/+-.-+-+-+-.)1 +-++-+-.+-+-+-.-+.-+++-+-.-+-/-+--++-111111111111111111-/+-.+-++,+-+-+-+-+.-+.-+.-/+-.+-+-+-31++*+-++-++-++-.+-+.+-+-+-.-+.-+++-+-.-+-+-.-++-.+-/+-.-+-+-+-.-+.-+++-+-.-+-+-.-++-.+-/+-.-+-+-+-.-+.-+++-+-.-+-+-.-++-.+-/+-.-+-+-+-.-+.-+++-+-.-+-+-.-++-.+-/+-.-+-.-+-+-(+*-+-.-++-.+++-+-+-++.+-+.-+-+-+-+.-++-0++-.-+.-++-+.+-.+-.++-0*-+-.+-.++-++++-.+-+-+-++-.+-++-+-.+-/+-.+-.++-.-++.+-++-+-+-.-+-+-.+*+-+-+-+-.-+-++-.+*+-+-+-+-.-+-++-.+*+-+&2+++.-+-++-.+*+-+-+-+-.-+-++-.+-++.++71111111111111111111123*/+-+.-/-.++-.+-+-+-+-+-+--++-.+*.-+%+-0-++-.+-+-.-+-+-+-.+*+-+-+-+-.-+-++-.+*+-+-+-+-.-+-++-.+*+-+-+-+-.-+-++-.+*+-+-+-+-.-+-++-.+*+-+-+-+-.-+-++-.+*+-+-+-+-.-+-++-.+*+-+-+-+-.-+-++-.+*+-+-+-+-.-+-++-++,+-.+ .+-.+-++-++-+-.+*+-.-+-++-++.-++-+-+.-+-+-++-+-+-.-+-+-+-+-+-+-+.+-+-+-+-+.-.-++-/.+-.+-++-.+-+.-+-.-+-+-++--++-.-+-.+-/.+-++-.+-++-0-++,+-++-+-.+-++-0-++,+-++-+-.+-++-0-++3)+-+-+-.+-++-0-++,+-++-+-.+-++-.*-++%1111111111111111111111114*-.+-+-+-+-++-+.+-++.-++.++-++-/-+.)5++-+.-++-0++-++-.+-++-0-++,+-++-+-.+-++-0-++,+-++-+-.+-++-0-++,+-++-+-.+-++-0-++,+-++-+-.+-++-0-++,+-++-+-.+-++-0-++,+-++-+-.+-++-0-++,+-++-+-.+-++-0-++,+-++-+-.+-++-/-++-(*-/*-++-.+-.-++-0-++-+-.-+-+-+.-+.+-+-+*-.+-.+-++-++.-++.+-.+-.-+-.++-.+-+-+-/+-.-+-++-.-+-+-.+-+++-+-+.-+-+.+-++-+-+-+-+-.+-++-0+-+-+.-/-+.-++++-0+-+-+.-/-+.-++++-0+-+-+.-/5+.-++++-0+-+-+.-/-+.-++++-0+-+-/+611111111111111111111111111-+-+-++.-+.-+-+-.+-+-.-+-.-+-.-++---.-+-+-+-+-+-.+-++-0+-+-+.-/-+.-++++-0+-+-+.-/-+.-++++-0+-+-+.-/-+.-++++-0+-+-+.-/-+.-++++-0+-+-+.-/-+.-++++-0+-+-+.-/-+.-++++-0+-+-+.-/-+.-++++-0+-+-+.-/-+.-++++-0+-.-++-. ',*-.+-.-+-++-.-+-++-.+++-+.-++-+-+-.++-0++-++-.+-++-+-+-+-++-/++-+-+-++-.+-++-.-++-+.-+-+.+-++-+-.-+.++-+.+-+-0+-++,+-.+-++-+.-+--.+-+-+-.+-+.-.-+--.+-+-+-.+-+.-.-+--.+-+-+-.+-+.-.-+--.+-+-+-.+-+.-.-+--.+-+ 211111111111111111111111111112&+.*.-+-+-+.+-++-+-+++-+-.++-+.-+-++.-++,+-.+-++-+.-+--.+-+-+-.+-+.-.-+--.+-+-+-.+-+.-.-+--.+-+-+-.+-+.-.-+--.+-+-+-.+-+.-.-+--.+-+-+-.+-+.-.-+--.+-+-+-.+-+.-.-+--.+-+-+-.+-+.-.-+--.+-+-+-.+-+.-.-+--++-.-++ ++-+-+++-+.-+++-.+-++-/-.+-+.-+.+-+-+-+--+-.-++-.+-.-+.+-++-.-+-+.+-+.-++-.+-+-++-.+-+++-+-+.-+++-++-+-.-+-++-+-+.-/-++-+-.-+-+++*+-.+-++-+-+-+-+++*+-.+-++-+-+-+-+++*+-.+-++-+-+-+-+++*+-.+-++-+-+-+-+++*+-.+-++-+-+-+-.+4111111)+-.-+.+-+.-++-/-+-++.-+-.+-+.+-+-.++-+-/*-+++-+-+.-/-++-+-.-+-+++*+-.+-++-+-+-+-+++*+-.+-++-+-+-+-+++*+-.+-++-+-+-+-+++*+-.+-++-+-+-+-+++*+-.+-++-+-+-+-+++*+-.+-++-+-+-+-+++*+-.+-++-+-+-+-+++*+-.+-++-+-+-+-+++,+-++-+-'+-0++-.-++-/*--++-0*-+-++-++-+-+-+.+-+.+++-++-+-+-+++-+-.-.+*-.+-+-.-+-.-++-.+*.-++-+-.-.+-+-+-.-+.-+-+++-+.-+.-+-+-+.-+.++-++-.-/-++-.+-.++.-++-.-/-++-.+-.++.-++-.-/-++-.+-.++.-++-.-/-++-.+-.++.-++-.-/-++-.+-.++.-++-+3111111 ++-++--+-+-.-+-++.-+-++-+-.-+-.-++-+-+.-.+-0-+.-+-+-+.-+.++-++-.-/-++-.+-.++.-++-.-/-++-.+-.++.-++-.-/-++-.+-.++.-++-.-/-++-.+-.++.-++-.-/-++-.+-.++.-++-.-/-++-.+-.++.-++-.-/-++-.+-.++.-++-.-/-++-.+-.++.-++-.-/-.+-+.+**-+-+-+.-+-.+.+-+-+.-.-+-.-+.+-.-+-.-+-.-+.-+.+-.-+-+-+++-/-++-+-+++-+++-+-+-/-+-+-++-++-.+-.+-+-+-.+-.-/*-+*-+++-.-+-+-+-+.-+-+-.+-+-+-+-+-+.-+-+-.+-+-+-+-+-+.-+-+-.+-+-+-+-+-+.-+-+-.+-+-+-+-+-+.-+-+-.+-+-+-+-+-+.-+-+11112++-+.-++.+-++-.+-+-+-.+-+.-++-++-+-+-.+-+-/*-+*-+++-.-+-+-+-+.-+-+-.+-+-+-+-+-+.-+-+-.+-+-+-+-+-+.-+-+-.+-+-+-+-+-+.-+-+-.+-+-+-+-+-+.-+-+-.+-+-+-+-+-+.-+-+-.+-+-+-+-+-+.-+-+-.+-+-+-+-+-+.-+-+-.+-+-+-+-+-+.-+-+-++-.+-*   ( .+-+.-++-+-+-+--.+-+-+++.-++-+-++++-++-+-++-+-+-+++-.+.-+-+-.+-+.+-+-.+--+.-+.-++-.+.-++-++-++-++.-++-+-+-.+-0+-.-++++-+.-++-/*+.-+-.+++-+.-++-/*+.-+-.+++-+.-++-/*+.-+-.+++-+.-++-/*+.-+-.+++-+.-++-/*+.-+-.+++-+.-++-/+.-)1111)+-.*-+*-+-.+-++-.+-+++-++-++-.+-+.+-++-+-+-.+-0+-.-++++-+.-++-/*+.-+-.+++-+.-++-/*+.-+-.+++-+.-++-/*+.-+-.+++-+.-++-/*+.-+-.+++-+.-++-/*+.-+-.+++-+.-++-/*+.-+-.+++-+.-++-/*+.-+-.+++-+.-++-/*+.-+-.+++-+.-++-/*+.-+-++-+-' ( '*-++-+.-++.+-++*+-.+-+-+-++-.+-+-.-++-.+.-+-.+-.+-.-+-+-.+-++-.-+-.+-+-.++-++-+-.++-+-.-+.-++-.-+-++-/.++-+-+--++-+-.-++-/.-+-+--++-+-.-++-/.-+-+--++-+-.-++-/.-+-+--++-+-.-++-/.-+-+--++-+-.-++-/.-+-+--++-+-.-++-/.-+-+-+ 1111 ++-/+-0+-++-+.-+-.++-.-.-++-++-.-+-.+-/.++-+-+--++-+-.-++-/.-+-+--++-+-.-++-/.-+-+--++-+-.-++-/.-+-+--++-+-.-++-/.-+-+--++-+-.-++-/.-+-+--++-+-.-++-/.-+-+--++-+-.-++-/.-+-+--++-+-.-++-/.-+-+--++-+-.-++-/.-+-+--+.-+-+.*' ()++.-++-+.-+-.+-/-++-.+-.-+-+-++.-+-.-++-+-+++-++-+-+++-++-.+-+++-++-.++-.-++-.++-+-+-++-+-+.-/++-.+-.-+--.+-.+++-.+-+-.-+--+.-.+++-.+-+-.-+--+.-.+++-.+-+-.-+--+.-.+++-.+-+-.-+--+.-.+++-.+-+-.-+--+.-.+++-.+-+-.-+--+.-.+-.1111++-+-.-+-.+-.+-+++-.-+-++-.-.+-/++-++-.-+--.+-.+++-.+-+-.-+--+.-.+++-.+-+-.-+--+.-.+++-.+-+-.-+--+.-.+++-.+-+-.-+--+.-.+++-.+-+-.-+--+.-.+++-.+-+-.-+--+.-.+++-.+-+-.-+--+.-.+++-.+-+-.-+--+.-.+++-.+-+-.-+--+.-.+++-+.-+-+'*-+-.-+-+-+-+-.-+.-++-++*.-+.-/-++++-+-+-.+-+-.-+.+-0-.+-+-+.-+-.+-/*--++-.-+-+-.-+-.+-.+-+-+-.-++-++-++*+-++-.-++-.+*+-.+*+-++-.-++-.+*+-.+*+-++-.-++-.+*+-.+*+-++-.-++-.+*+-.+*+-++-.-++-.+*+-.+*+-++-.-++-.+*+-.+*+-++-++)11+-/,-++-+-+-+-+-.-+-+-++-++-+-.-+-.+-++-++*+-++-.-++-.+*+-.+*+-++-.-++-.+*+-.+*+-++-.-++-.+*+-.+*+-++-.-++-.+*+-.+*+-++-.-++-.+*+-.+*+-++-.-++-.+*+-.+*+-++-.-++-.+*+-.+*+-++-.-++-.+*+-.+*+-++-.-++-.+*+-.+*+-++-.-++-++-. (.+-++-.+-.+*.-++-+-+-.+-/-++-+-.+-.-/.+-++-.-+++-+-+-++-.+-+-+-++-.-+.++-++-++-+-+.++-/*-0*-++-++-.+-.+-0-++-+-++-++-0-++-0-++-+-++-++-0-++-0-++-+-++-++-0-++-0-++-+-++-++-0-++-0-++-+-++-++-0-++-0-++-+-++-++-0-++-0-++-+-+ 11&+.-++*-.++-.+-++-+-.+.+-0*-/*-++-++-.+-.+-0-++-+-++-++-0-++-0-++-+-++-++-0-++-0-++-+-++-++-0-++-0-++-+-++-++-0-++-0-++-+-++-++-0-++-0-++-+-++-++-0-++-0-++-+-++-++-0-++-0-++-+-++-++-0-++-0-++-+-++-++-0-++-0-++-+-+.-+.-++(*-.+-++-++-/-++-.++-/*-.-+.-/*-+-+-+-+-.+-+++-+-.+-+-+-++-.+-.+-+-++-+--.+-.+-.+++-+-.-++-+.+-.-+-+-++-+-+.-+.+-.-+-+-++-+-+.-+.+-.-+-+-++-+-+.-+.+-.-+-+-++-+-+.-+.+-.-+-+-++-+-+.-+.+-.-+-+-++-+-+.-+.+-.-+-+-++-+-+.-+.+-+11-+-+-0-+-.-++-+.-++++-+-+-+.-+.+-.-+-+-++-+-+.-+.+-.-+-+-++-+-+.-+.+-.-+-+-++-+-+.-+.+-.-+-+-++-+-+.-+.+-.-+-+-++-+-+.-+.+-.-+-+-++-+-+.-+.+-.-+-+-++-+-+.-+.+-.-+-+-++-+-+.-+.+-.-+-+-++-+-+.-+.+-.-+-+-++-+-+.-+.+-+-+-++-+++-+.-+.-+-.+-+-+-.-++-++-+-.++-++,+-++-.-+-.-++-.+.+-.-++-++-0++-+-.+++-+-+-+-.-+-/*-.-+-+-/++-.+-+-0*-+-+-+-/++-.+-+-0*-+-+-+-/++-.+-+-0*-+-+-+-/++-.+-+-0*-+-+-+-/++-.+-+-0*-+-+-+-/++-.+-+-0*-+-+-+-/++-.+-+-0*-+-+-+-.+)(++-++-+++-++-.-+-.-+-+-0*-+-+-+-/++-.+-+-0*-+-+-+-/++-.+-+-0*-+-+-+-/++-.+-+-0*-+-+-+-/++-.+-+-0*-+-+-+-/++-.+-+-0*-+-+-+-/++-.+-+-0*-+-+-+-/++-.+-+-0*-+-+-+-/++-.+-+-0*-+-+-+-/++-.+-+-0*-+-+-+-/++-.+-+-0*-+-+-+-0++-.+-.'() +*-.-+-+-++-+-+.+-++-.-+.-+-+-.-+.-/-+.-+++-++-+-+*-/-++-+-+.-+-.-.+-+-+-.++.-++-+.*-+++-+.-+-.-++-.+*-+.+-+.-+-.-++-.+*-+.+-+.-+-.-++-.+*-+.+-+.-+-.-++-.+*-+.+-+.-+-.-++-.+*-+.+-+.-+-.-++-.+*-+.+-+.-+-.-++-.+*-+.+-+.-+-0&"+-.+-+-.-++-++++-++-.+*-+.+-+.-+-.-++-.+*-+.+-+.-+-.-++-.+*-+.+-+.-+-.-++-.+*-+.+-+.-+-.-++-.+*-+.+-+.-+-.-++-.+*-+.+-+.-+-.-++-.+*-+.+-+.-+-.-++-.+*-+.+-+.-+-.-++-.+*-+.+-+.-+-.-++-.+*-+.+-+.-+-.-++-.+*-+.+-+.-+-+-++-/+  ,-+-+++-.+-.++-+-+.-++-+-++.+-+-+-+-.+-+-/-.+-+.+-/*-0*-/+.-+-+*-++-++.-++-/-+.-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++----+-/,-++-.-.+-/-.+-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++-.+-+-/-.-+-.+-+++-.+-.-*'++++-.-++-++-.-+-+-++-.+-.-+-++.+-++-+-+.-++-.-+-.-++-+.-+-/++-.++-*.-+-.-+-.+-+.*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-.+*-+++-++-+-.-++-+++-+-.-+-.-+-.-+-.++.-+-++-+++-+.-+-.+-+.+-+-.-+++-+-+-.-+-+-.-.-/-+-.-/+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-+-/-.-+-0+-++-+-+-.-+-.((*+-++++-++-+-++-+-++.-++-.-+-+-+-+-+-+-.+-++-.-+++.-++-.+*+-++-.++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-+.-+++-+--.+-.+*.-++-++ .+-.-+-+.-++.+-.-+.-+-.-+-.++-++.+-.+-++-++-++-.-+-++-++-/-++-+-+-.++*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-+-.-+.+*+-++-/-++-.+-  *-+++-.+-++-+-+-++-+-++-++-.-+.-+-++-.+-+.-.+-+++-.+-.+-.-+.-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-.++-+-+-0-+.-+-.+-/+-+'*+-.-+-+-+-.-++.-+-+.+-.+-++-+-+-.+-++-+-+-+-.+-+-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-+-+-.++-+-++-/*-+-.--+.++-++-.+*.-++-+-/.+-/-++-+-+.+-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++-+-.-++-+-.-+.+-++.+-,-++-++-/-++-.-+-+-+-.+-0+.-+-.+-++-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-.++-+.-.+-++-+-.+-+-+++.-/.-+-.+-+++.-+.-++-+-+-+-++-.+-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-+-.+-++-.+-.-++-+-++'+--+-+-+-+-.-+--++-/*-.*-++-.+-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-++-+-++-+-+++-.++-.'((**+,+-++.+-+-.+*.-+-.+-/.+-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-/+-.+-.-+++-.-+-.-++.+-/-.+-+-/+*+-/-++-+-+-+-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.--++-++-.-+'*-.-++-+-.*-0-+-.+-.+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++,+-+.-+++++*+-+-.++-/*-/*-+-++-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-/-++-+-+-* ++-.++-.-+-.+-.++-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-+.-+.+-.-',-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-++-+-+-+-+++((*++-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-, ++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-++-+-(+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.+-.++ ,*-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-((*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*' '((  ('        ' (    '  '( (   ''''' '(('''#&'&#$$#&#$$&#$$&#$$&$""&$"&$"&$"&$'(####$#('"$&$#$"$#$"$#$$#$"$ ( " &!##$'&!##$'&!##$'&!##$'$!$#('("'""""$ ''$!"""$)"!%!!!$$)(##### ( '($""$""$"$""& ''' ((''#"!#"#"##"'&  # # # #  $#&$#&$#&$#&&"&"&&" (!!!!  '$"$"$$" $$$$$"""""""($$#####!'(!!&&$#### ($$ &"#""#" '#$#&&$#" #%&#'&!##'&!#'&!##'&!&"!!$# $$!$$!$#  #$$$  #! !"####$!"#!"##!"$# !"!!!!!                      '' 2 n bf - 2 bf -@"Arial- 2 bf  2 bf @"Arial- 2 F bfGENERICY] 2 F bf   2 bfSECURITY] 2 lbf   2 DbfGUIDEI] 2 Dbf  @"Arial-  2 bf  j@"Arial- 82 bfFOR HUMANITARIAN ORGANISATIONS\ul*llil+^il,jl*ulvjm*gi\*uld  2  bf T 2 Abf S 2 bf S 2 bf S 2 Gbf S 2 bf S)2 bfCommissioned by ECHOl\*SS*\\T\*\R*dllu 2 bf S 2 Lbf S2 bf2004SSTS 2 %bf T- 2 bf S-ffbbeeaadd``cc__bb^^aa]]``\\__[[^^ZZ ] ]Y Y  \ \X X  [ [W W  Z ZV V  Y YU U XXTTWWSSVVRRUUQQTTPP՜.+,D՜.+,x4x  ECHOw EC - ECHOw i: 3;ECHO Generic Security Guide for Humanitarian Organisations Start here Aim of this Guide What this Guide covers# What this Guide does not cover( If you are new to humanitarian work If you are more experienced' If you are just visiting the field4 A note for senior managers or security advisors( Do I really need a Guide this long? How to use this GuideIntroduction to security What is security? Why is security important? Approaches to security# Risk, Threat and Vulnerability Definitions#Security preparation for the field) Security assessment before deploying- Prepare a security plan before deploying Humanitarian space5 Consider security aspects of proposed programmes Selection of staff Training Briefing Equipping Preparing illiterate staff9 Preparing security-related aspects of administration Offices and warehouses Staff accommodation% Standard documents and equipment Personal preparation Medical preparation!Security management in the field Revised security assessment Revised security plan Information-gathering( Relations with the local population' Relations with other organisations Local authorities Local security forces) Other humanitarian organisations The UN security system& International military forces# International police force Embassies Donors Local partnersA Security coordination between humanitarian organisations( The Field-Headquarters relationship Reporting Title Headings2df 8@ _PID_HLINKSAf8+phttp://www.plutobooks.com/XCmhttp://www.icrc.org/, jhttp://www.plymbridge.com/:.ghttp://www.odihpn.org/Odhttp://www.mango.org.uk/\Mahttp://www.alertnet.org/U^http://www.crisisweb.org/B[[!http://www.humanitarianinfo.org/RAXhttp://www.irinnews.org/XUhttp://www.reliefweb.int/{<Rhttp://www.peopleinaid.org/PSOhttp://www.bayefsky.com/p&Lhttp://www.amnesty.org/~<Ihttp://www.hrw.org/LFhttp://www.unhchr.ch/XCChttp://www.icrc.org/XC@http://www.icrc.org/eu=4http://www.unhchr.ch/html/menu2/6/protocolchild.htmYr:1http://www.un.org/Depts/mine/UNDocs/ban_trty.htmr70http://disarmament.un.org:8080/TreatyStatus.nsft)40http://www.un.org/millennium/law/xxvi-18-19.htm?]1.http://www.unog.ch/disarm/distreat/bac_72.htm}6.\http://portal.unesco.org/culture/en/ev.php-URL_ID=8450&URL_DO=DO_TOPIC&URL_SECTION=201.html3j+http://www.icrc.org/eng/ihl-%( http://www.fitfortravel.nhs.uk/#/%http://www.who.int/ithO"http://www.mango.org.uk/Sm0http://www.europa.eu.int/comm/echo/index_en.htmU/$mailto:Anthony-Val.Flynn@cec.eu.intSm0http://www.europa.eu.int/comm/echo/index_en.htmU}mailto:echo-eval@cec.eu.intI&http://www.evaluationpartnership.com/ONhttp://www.redr.org/{< http://www.peopleinaid.org/}( http://www.interaction.org/Qhttp://www.bioforce.asso.fr/? _Toc88728482? _Toc88728481? _Toc887284800 _Toc887284790 _Toc887284780 _Toc887284770 _Toc887284760 _Toc887284750 _Toc887284740 _Toc887284730 _Toc887284720 _Toc887284710 _Toc887284701 _Toc887284691 _Toc887284681 _Toc887284671 _Toc887284661 _Toc887284651 _Toc887284641 _Toc887284631 _Toc887284621 _Toc887284611| _Toc887284602v _Toc887284592p _Toc887284582j _Toc887284572d _Toc887284562^ _Toc887284552X _Toc887284542R _Toc887284532L _Toc887284522F _Toc887284512@ _Toc887284503: _Toc8872844934 _Toc887284483. _Toc887284473( _Toc887284463" _Toc887284453 _Toc887284443 _Toc887284433 _Toc887284423  _Toc887284413 _Toc887284404 _Toc887284394 _Toc887284384 _Toc887284374 _Toc887284364 _Toc887284354 _Toc887284344 _Toc887284334 _Toc887284324 _Toc887284314 _Toc887284305 _Toc887284295 _Toc887284285 _Toc887284275 _Toc887284265 _Toc887284255 _Toc887284245 _Toc887284235 _Toc887284225 _Toc887284215 _Toc887284206 _Toc887284196 _Toc887284186z _Toc887284176t _Toc887284166n _Toc887284156h _Toc887284146b _Toc887284136\ _Toc887284126V _Toc887284116P _Toc887284107J _Toc887284097D _Toc887284087> _Toc8872840778 _Toc8872840672 _Toc887284057, _Toc887284047& _Toc887284037  _Toc887284027 _Toc887284017 _Toc88728400> _Toc88728399> _Toc88728398> _Toc88728397> _Toc88728396> _Toc88728395> _Toc88728394> _Toc88728393> _Toc88728392> _Toc88728391> _Toc88728390? _Toc88728389? _Toc88728388? _Toc88728387? _Toc88728386? _Toc88728385? _Toc88728384? _Toc88728383? _Toc88728382? _Toc88728381? _Toc887283800 _Toc887283790 _Toc887283780 _Toc887283770 _Toc887283760~ _Toc887283750x _Toc887283740r _Toc887283730l _Toc887283720f _Toc887283710` _Toc887283701Z _Toc887283691T _Toc887283681N _Toc887283671H _Toc887283661B _Toc887283651< _Toc8872836416 _Toc8872836310 _Toc887283621* _Toc887283611$ _Toc887283602 _Toc887283592 _Toc887283582 _Toc887283572  _Toc887283562 _Toc887283552 _Toc887283542 _Toc887283532 _Toc887283522 _Toc887283512 _Toc887283503 _Toc887283493 _Toc887283483 _Toc887283473 _Toc887283463 _Toc887283453 _Toc887283443 _Toc887283433 _Toc887283423 _Toc887283413 _Toc887283404 _Toc887283394 _Toc887283384 _Toc887283374 _Toc887283364 _Toc887283354 _Toc887283344 _Toc887283334| _Toc887283324v _Toc887283314p _Toc887283305j _Toc887283295d _Toc887283285^ _Toc887283275X _Toc887283265R _Toc887283255L _Toc887283245F _Toc887283235@ _Toc887283225: _Toc8872832154 _Toc887283206. _Toc887283196( _Toc887283186" _Toc887283176 _Toc887283166 _Toc887283156 _Toc887283146  _Toc887283136 _Toc887283126 _Toc887283116 _Toc887283107 _Toc887283097 _Toc887283087 _Toc887283077 _Toc887283067 _Toc887283057 _Toc887283047 _Toc887283037 _Toc887283027 _Toc887283017 _Toc88728300> _Toc88728299> _Toc88728298> _Toc88728297> _Toc88728296> _Toc88728295> _Toc88728294> _Toc88728293> _Toc88728292> _Toc88728291> _Toc88728290?z _Toc88728289?t _Toc88728288?n _Toc88728287?h _Toc88728286?b _Toc88728285?\ _Toc88728284?V _Toc88728283?P _Toc88728282?J _Toc88728281?D _Toc887282800> _Toc8872827908 _Toc8872827802 _Toc887282770, _Toc887282760& _Toc887282750  _Toc887282740 _Toc887282730 _Toc887282720 _Toc887282710 _Toc88728270Sm0http://www.europa.eu.int/comm/echo/index_en.htmU/$mailto:Anthony-Val.Flynn@cec.eu.intu`l3http://www.humanitarianinfo.org/iasc/prodsec01.docODihttp://www.odihpn.org.uk/XCfhttp://www.icrc.org/f]c9http://www.the-ecentre.net/resources/e_library/index.cfm i`mailto:icrc.gva@icrc.org{<]http://www.peopleinaid.org/LZ2http://www.peopleinaid.org/download/Security1.doc:.Whttp://www.odihpn.org/} T#http://www.un.org/Depts/dpko/mine/ =Qmailto:MineAction@un.org:.Nhttp://www.odihpn.org/OKhttp://www.mango.org.uk/QAH-http://www.homeoffice.gov.uk/docs/bombs2.pdfk/E,http://www.homeoffice.gov.uk/docs/bombs.pdfQAB-http://www.homeoffice.gov.uk/docs/bombs2.pdfk/?,http://www.homeoffice.gov.uk/docs/bombs.pdf51<#http://www.rospa.com/CMS/index.asp, 9http://www.plymbridge.com/{<6http://www.peopleinaid.org/3http://www.unhcr.ch/{<0http://www.peopleinaid.org/:.-http://www.odihpn.org/'**http://www.amazon.com/'*'http://www.amazon.com/D$.http://www.ifrc.org/publicat/conduct/code.asp? !3http://www.interaction.org/disaster/NGO_field.htmlDhttp://www.sphereproject.org/{<http://www.peopleinaid.org/D.http://www.ifrc.org/publicat/conduct/code.aspD.http://www.ifrc.org/publicat/conduct/code.asp[%http://www.un.org/law/cod/safety.htmXChttp://www.icrc.org/D .http://www.ifrc.org/publicat/conduct/code.aspD .http://www.ifrc.org/publicat/conduct/code.aspx`/http://ochaonline.un.org/DocView.asp?DocID=426D.http://www.ifrc.org/publicat/conduct/code.aspD.http://www.ifrc.org/publicat/conduct/code.asp  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~                           ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                            ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                            ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                            ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~  Root Entry Fл Data *1Table"zWordDocumentR SummaryInformation(O xDocumentSummaryInformation8 nCompObjj  FMicrosoft Word Document MSWordDocWord.Document.89q